Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-18710 (GCVE-0-2018-18710)
Vulnerability from cvelistv5
Published
2018-10-27 22:00
Modified
2024-08-05 11:16
Severity ?
EPSS score ?
Summary
An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T11:16:00.411Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "USN-3848-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3848-2/", }, { name: "USN-3847-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3847-1/", }, { name: "USN-3847-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3847-2/", }, { name: "USN-3849-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3849-1/", }, { name: "106041", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106041", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276", }, { name: "USN-3849-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3849-2/", }, { name: "USN-3848-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3848-1/", }, { name: "USN-3847-3", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3847-3/", }, { name: "USN-3846-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3846-1/", }, { name: "[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/torvalds/linux/commit/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276", }, { name: "[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html", }, { name: "[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2018-10-27T00:00:00", descriptions: [ { lang: "en", value: "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-04-01T20:06:09", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "USN-3848-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3848-2/", }, { name: "USN-3847-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3847-1/", }, { name: "USN-3847-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3847-2/", }, { name: "USN-3849-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3849-1/", }, { name: "106041", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106041", }, { tags: [ "x_refsource_MISC", ], url: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276", }, { name: "USN-3849-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3849-2/", }, { name: "USN-3848-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3848-1/", }, { name: "USN-3847-3", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3847-3/", }, { name: "USN-3846-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3846-1/", }, { name: "[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/torvalds/linux/commit/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276", }, { name: "[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html", }, { name: "[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-18710", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "USN-3848-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3848-2/", }, { name: "USN-3847-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3847-1/", }, { name: "USN-3847-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3847-2/", }, { name: "USN-3849-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3849-1/", }, { name: "106041", refsource: "BID", url: "http://www.securityfocus.com/bid/106041", }, { name: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276", refsource: "MISC", url: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276", }, { name: "USN-3849-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3849-2/", }, { name: "USN-3848-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3848-1/", }, { name: "USN-3847-3", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3847-3/", }, { name: "USN-3846-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3846-1/", }, { name: "[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html", }, { name: "https://github.com/torvalds/linux/commit/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276", refsource: "MISC", url: "https://github.com/torvalds/linux/commit/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276", }, { name: "[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html", }, { name: "[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-18710", datePublished: "2018-10-27T22:00:00", dateReserved: "2018-10-27T00:00:00", dateUpdated: "2024-08-05T11:16:00.411Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"4.19\", \"matchCriteriaId\": \"AF8125D1-648B-4421-B0FC-089A20CBB248\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*\", \"matchCriteriaId\": \"8D305F7A-D159-4716-AB26-5E38BB5CD991\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"B5A6F2F3-4894-4392-8296-3B8DD2679084\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07C312A0-CD2C-4B9C-B064-6409B25C278F\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.\"}, {\"lang\": \"es\", \"value\": \"Se ha descubierto un problema en el kernel de Linux hasta la versi\\u00f3n 4.19. Una fuga de informaci\\u00f3n en cdrom_ioctl_select_disc en drivers/cdrom/cdrom.c podr\\u00eda ser empleada por atacantes locales para leer memoria del kernel debido a que una conversi\\u00f3n de un long no firmado a int interfiere con la comprobaci\\u00f3n de l\\u00edmites. Esto es similar a CVE-2018-10940 y CVE-2018-16658.\"}]", id: "CVE-2018-18710", lastModified: "2024-11-21T03:56:25.320", metrics: "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 2.1, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 3.9, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", published: "2018-10-29T12:29:05.807", references: "[{\"url\": \"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/106041\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://github.com/torvalds/linux/commit/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3846-1/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3847-1/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3847-2/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3847-3/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3848-1/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3848-2/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3849-1/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3849-2/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/106041\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://github.com/torvalds/linux/commit/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3846-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3847-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3847-2/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3847-3/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3848-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3848-2/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3849-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3849-2/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]", sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-200\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2018-18710\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-10-29T12:29:05.807\",\"lastModified\":\"2024-11-21T03:56:25.320\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.\"},{\"lang\":\"es\",\"value\":\"Se ha descubierto un problema en el kernel de Linux hasta la versión 4.19. Una fuga de información en cdrom_ioctl_select_disc en drivers/cdrom/cdrom.c podría ser empleada por atacantes locales para leer memoria del kernel debido a que una conversión de un long no firmado a int interfiere con la comprobación de límites. Esto es similar a CVE-2018-10940 y CVE-2018-16658.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.19\",\"matchCriteriaId\":\"AF8125D1-648B-4421-B0FC-089A20CBB248\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"8D305F7A-D159-4716-AB26-5E38BB5CD991\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07C312A0-CD2C-4B9C-B064-6409B25C278F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/106041\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://github.com/torvalds/linux/commit/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3846-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3847-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3847-2/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3847-3/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3848-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3848-2/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3849-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3849-2/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/106041\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://github.com/torvalds/linux/commit/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3846-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3847-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3847-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3847-3/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3848-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3848-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3849-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3849-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", }, }
suse-su-2019:0095-1
Vulnerability from csaf_suse
Published
2019-01-15 13:58
Modified
2019-01-15 13:58
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 Azure kernel was updated to 4.4.162 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).
- CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).
- CVE-2018-18690: A local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE operations with conversion of an attr from short to long form (bnc#1105025).
- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).
- CVE-2018-9516: In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. (bnc#1108498).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bnc#1107829).
- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bnc#1108399).
- CVE-2018-16597: Incorrect access checking in overlayfs mounts could be used by local attackers to modify or truncate files in the underlying filesystem (bnc#1106512).
- CVE-2018-14613: There is an invalid pointer dereference in io_ctl_map_page() when mounting and operating a crafted btrfs image, because of a lack of block group item validation in check_leaf_item in fs/btrfs/tree-checker.c (bnc#1102896).
- CVE-2018-14617: There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory (bnc#1102870).
- CVE-2018-16276: Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges (bnc#1106095 bnc#1115593).
- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1087209).
- CVE-2018-7480: The blkcg_init_queue function in block/blk-cgroup.c allowed local users to cause a denial of service (double free) or possibly have unspecified other impact by triggering a creation failure (bnc#1082863).
The following non-security bugs were fixed:
- 6lowpan: iphc: reset mac_header after decompress to fix panic (bnc#1012382).
- alsa: bebob: use address returned by kmalloc() instead of kernel stack for streaming DMA mapping (bnc#1012382).
- alsa: emu10k1: fix possible info leak to userspace on SNDRV_EMU10K1_IOCTL_INFO (bnc#1012382).
- alsa: hda: Add AZX_DCAPS_PM_RUNTIME for AMD Raven Ridge (bnc#1012382).
- alsa: hda - Fix cancel_work_sync() stall from jackpoll work (bnc#1012382).
- alsa: hda/realtek - Cannot adjust speaker's volume on Dell XPS 27 7760 (bnc#1012382).
- alsa: msnd: Fix the default sample sizes (bnc#1012382).
- alsa: pcm: Fix snd_interval_refine first/last with open min/max (bnc#1012382).
- alsa: usb-audio: Fix multiple definitions in AU0828_DEVICE() macro (bnc#1012382).
- apparmor: remove no-op permission check in policy_unpack (git-fixes).
- arc: build: Get rid of toolchain check (bnc#1012382).
- arc: clone syscall to setp r25 as thread pointer (bnc#1012382).
- arch/hexagon: fix kernel/dma.c build warning (bnc#1012382).
- arch-symbols: use bash as interpreter since the script uses bashism.
- arc: [plat-axs*]: Enable SWAP (bnc#1012382).
- arm64: bpf: jit JMP_JSET_{X,K} (bsc#1110613).
- arm64: Correct type for PUD macros (bsc#1110600).
- arm64: cpufeature: Track 32bit EL0 support (bnc#1012382).
- arm64: dts: qcom: db410c: Fix Bluetooth LED trigger (bnc#1012382).
- arm64: fix erroneous __raw_read_system_reg() cases (bsc#1110606).
- arm64: Fix potential race with hardware DBM in ptep_set_access_flags() (bsc#1110605).
- arm64: fpsimd: Avoid FPSIMD context leakage for the init task (bsc#1110603).
- arm64: jump_label.h: use asm_volatile_goto macro instead of 'asm goto' (bnc#1012382).
- arm64: kasan: avoid bad virt_to_pfn() (bsc#1110612).
- arm64: kasan: avoid pfn_to_nid() before page array is initialized (bsc#1110619).
- arm64/kasan: do not allocate extra shadow memory (bsc#1110611).
- arm64: kernel: Update kerneldoc for cpu_suspend() rename (bsc#1110602).
- arm64: kgdb: handle read-only text / modules (bsc#1110604).
- arm64: KVM: Sanitize PSTATE.M when being set from userspace (bnc#1012382).
- arm64: KVM: Tighten guest core register access from userspace (bnc#1012382).
- arm64/mm/kasan: do not use vmemmap_populate() to initialize shadow (bsc#1110618).
- arm64: ptrace: Avoid setting compat FP[SC]R to garbage if get_user fails (bsc#1110601).
- arm64: supported.conf: mark armmmci as not supported
- arm64 Update config files. (bsc#1110468) Set MMC_QCOM_DML to build-in and delete driver from supported.conf
- arm64: vdso: fix clock_getres for 4GiB-aligned res (bsc#1110614).
- arm: dts: at91: add new compatibility string for macb on sama5d3 (bnc#1012382).
- arm: dts: dra7: fix DCAN node addresses (bnc#1012382).
- arm: exynos: Clear global variable on init error path (bnc#1012382).
- arm: hisi: check of_iomap and fix missing of_node_put (bnc#1012382).
- arm: hisi: fix error handling and missing of_node_put (bnc#1012382).
- arm: hisi: handle of_iomap and fix missing of_node_put (bnc#1012382).
- arm: mvebu: declare asm symbols as character arrays in pmsu.c (bnc#1012382).
- asm/sections: add helpers to check for section data (bsc#1063026).
- ASoC: cs4265: fix MMTLR Data switch control (bnc#1012382).
- ASoC: dapm: Fix potential DAI widget pointer deref when linking DAIs (bnc#1012382).
- ASoC: sigmadsp: safeload should not have lower byte limit (bnc#1012382).
- ASoC: wm8804: Add ACPI support (bnc#1012382).
- ASoC: wm8994: Fix missing break in switch (bnc#1012382).
- ata: libahci: Correct setting of DEVSLP register (bnc#1012382).
- ath10k: disable bundle mgmt tx completion event support (bnc#1012382).
- ath10k: fix scan crash due to incorrect length calculation (bnc#1012382).
- ath10k: fix use-after-free in ath10k_wmi_cmd_send_nowait (bnc#1012382).
- ath10k: prevent active scans on potential unusable channels (bnc#1012382).
- ath10k: protect ath10k_htt_rx_ring_free with rx_ring.lock (bnc#1012382).
- audit: fix use-after-free in audit_add_watch (bnc#1012382).
- autofs: fix autofs_sbi() does not check super block type (bnc#1012382).
- binfmt_elf: Respect error return from `regset->active' (bnc#1012382).
- block: bvec_nr_vecs() returns value for wrong slab (bsc#1082979).
- bluetooth: Add a new Realtek 8723DE ID 0bda:b009 (bnc#1012382).
- bluetooth: h5: Fix missing dependency on BT_HCIUART_SERDEV (bnc#1012382).
- bluetooth: hidp: Fix handling of strncpy for hid->name information (bnc#1012382).
- bnxt_en: Fix TX timeout during netpoll (bnc#1012382).
- bonding: avoid possible dead-lock (bnc#1012382).
- bpf: fix cb access in socket filter programs on tail calls (bsc#1012382).
- bpf: fix map not being uncharged during map creation failure (bsc#1012382).
- bpf: fix overflow in prog accounting (bsc#1012382).
- bpf, s390: fix potential memleak when later bpf_jit_prog fails (git-fixes).
- bpf, s390x: do not reload skb pointers in non-skb context (git-fixes).
- btrfs: add a comp_refs() helper (dependency for bsc#1031392).
- btrfs: Add checker for EXTENT_CSUM (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: add missing initialization in btrfs_check_shared (Git-fixes bsc#1112262).
- btrfs: Add sanity check for EXTENT_DATA when reading out leaf (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: add tracepoints for outstanding extents mods (dependency for bsc#1031392).
- btrfs: add wrapper for counting BTRFS_MAX_EXTENT_SIZE (dependency for bsc#1031392).
- btrfs: Check if item pointer overlaps with the item itself (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: Check that each block group has corresponding chunk at mount time (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: cleanup extent locking sequence (dependency for bsc#1031392).
- btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag (Follow up fixes for bsc#1031392).
- btrfs: delayed-inode: Remove wrong qgroup meta reservation calls (bsc#1031392).
- btrfs: delayed-inode: Use new qgroup meta rsv for delayed inode and item (bsc#1031392).
- btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667).
- btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).
- btrfs: fix error handling in btrfs_dev_replace_start (bsc#1107535).
- btrfs: fix invalid attempt to free reserved space on failure to cow range (dependency for bsc#1031392).
- btrfs: fix missing error return in btrfs_drop_snapshot (Git-fixes bsc#1109919).
- btrfs: Fix race condition between delayed refs and blockgroup removal (Git-fixes bsc#1112263).
- btrfs: Fix wrong btrfs_delalloc_release_extents parameter (bsc#1031392).
- btrfs: Introduce mount time chunk <-> dev extent mapping check (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: kill trans in run_delalloc_nocow and btrfs_cross_ref_exist (dependency for bsc#1031392).
- btrfs: make the delalloc block rsv per inode (dependency for bsc#1031392).
- btrfs: Move leaf and node validation checker to tree-checker.c (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: pass delayed_refs directly to btrfs_find_delayed_ref_head (dependency for bsc#1031392).
- btrfs: qgroup: Add quick exit for non-fs extents (dependency for bsc#1031392).
- btrfs: qgroup: Cleanup btrfs_qgroup_prepare_account_extents function (dependency for bsc#1031392).
- btrfs: qgroup: Cleanup the remaining old reservation counters (bsc#1031392).
- btrfs: qgroup: Commit transaction in advance to reduce early EDQUOT (bsc#1031392).
- btrfs: qgroup: Do not use root->qgroup_meta_rsv for qgroup (bsc#1031392).
- btrfs: qgroup: Fix wrong qgroup reservation update for relationship modification (bsc#1031392).
- btrfs: qgroup: Introduce function to convert META_PREALLOC into META_PERTRANS (bsc#1031392).
- btrfs: qgroup: Introduce helpers to update and access new qgroup rsv (bsc#1031392).
- btrfs: qgroup: Make qgroup_reserve and its callers to use separate reservation type (bsc#1031392).
- btrfs: qgroup: Skeleton to support separate qgroup reservation type (bsc#1031392).
- btrfs: qgroups: opencode qgroup_free helper (dependency for bsc#1031392).
- btrfs: qgroup: Split meta rsv type into meta_prealloc and meta_pertrans (bsc#1031392).
- btrfs: qgroup: Update trace events for metadata reservation (bsc#1031392).
- btrfs: qgroup: Update trace events to use new separate rsv types (bsc#1031392).
- btrfs: qgroup: Use independent and accurate per inode qgroup rsv (bsc#1031392).
- btrfs: qgroup: Use root::qgroup_meta_rsv_* to record qgroup meta reserved space (bsc#1031392).
- btrfs: qgroup: Use separate meta reservation type for delalloc (bsc#1031392).
- btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized (bnc#1012382).
- btrfs: remove type argument from comp_tree_refs (dependency for bsc#1031392).
- btrfs: replace: Reset on-disk dev stats value after replace (bnc#1012382).
- btrfs: rework outstanding_extents (dependency for bsc#1031392).
- btrfs: scrub: Do not use inode page cache in scrub_handle_errored_block() (bsc#1108096).
- btrfs: switch args for comp_*_refs (dependency for bsc#1031392).
- btrfs: Take trans lock before access running trans in check_delayed_ref (Follow up fixes for bsc#1031392).
- btrfs: tree-checker: Add checker for dir item (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Detect invalid and empty essential trees (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Enhance btrfs_check_node output (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Enhance output for btrfs_check_leaf (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Enhance output for check_csum_item (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Enhance output for check_extent_data_item (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Fix false panic for sanity test (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Replace root parameter with fs_info (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: use %zu format string for size_t (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: use %zu format string for size_t (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Verify block_group_item (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: use correct compare function of dirty_metadata_bytes (bnc#1012382).
- btrfs: Verify that every chunk has corresponding block group at mount time (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- ceph: avoid a use-after-free in ceph_destroy_options() (bsc#1112007).
- cfg80211: fix a type issue in ieee80211_chandef_to_operating_class() (bnc#1012382).
- cfg80211: nl80211_update_ft_ies() to validate NL80211_ATTR_IE (bnc#1012382).
- cfq: Give a chance for arming slice idle timer in case of group_idle (bnc#1012382).
- cgroup: Fix deadlock in cpu hotplug path (bnc#1012382).
- cgroup, netclassid: add a preemption point to write_classid (bnc#1098996).
- cifs: check for STATUS_USER_SESSION_DELETED (bsc#1112902).
- cifs: check if SMB2 PDU size has been padded and suppress the warning (bnc#1012382).
- cifs: connect to servername instead of IP for IPC$ share (bsc#1106359).
- cifs: fix memory leak in SMB2_open() (bsc#1112894).
- cifs: Fix use after free of a mid_q_entry (bsc#1112903).
- cifs: fix wrapping bugs in num_entries() (bnc#1012382).
- cifs: integer overflow in in SMB2_ioctl() (bsc#1012382).
- cifs: prevent integer overflow in nxt_dir_entry() (bnc#1012382).
- cifs: read overflow in is_valid_oplock_break() (bnc#1012382).
- clk: imx6ul: fix missing of_node_put() (bnc#1012382).
- clocksource/drivers/ti-32k: Add CLOCK_SOURCE_SUSPEND_NONSTOP flag for non-am43 SoCs (bnc#1012382).
- coresight: Handle errors in finding input/output ports (bnc#1012382).
- coresight: tpiu: Fix disabling timeouts (bnc#1012382).
- cpu/hotplug: Fix SMT supported evaluation (bsc#1089343).
- crypto: clarify licensing of OpenSSL asm code ().
- crypto: mxs-dcp - Fix wait logic on chan threads (bnc#1012382).
- crypto: sharah - Unregister correct algorithms for SAHARA 3 (bnc#1012382).
- crypto: skcipher - Fix -Wstringop-truncation warnings (bnc#1012382).
- crypto: vmx - Remove overly verbose printk from AES XTS init (git-fixes).
- debugobjects: Make stack check warning more informative (bnc#1012382).
- Define dependencies of in-kernel KMPs statically This allows us to use rpm's internal dependency generator (bsc#981083).
- Define early_radix_enabled() (bsc#1094244).
- dmaengine: pl330: fix irq race with terminate_all (bnc#1012382).
- dm cache: fix resize crash if user does not reload cache table (bnc#1012382).
- dm kcopyd: avoid softlockup in run_complete_job (bnc#1012382).
- dm-mpath: do not try to access NULL rq (bsc#1110337).
- dm-mpath: finally fixup cmd_flags (bsc#1110930).
- dm thin metadata: fix __udivdi3 undefined on 32-bit (bnc#1012382).
- dm thin metadata: try to avoid ever aborting transactions (bnc#1012382).
- Do not ship firmware (bsc#1054239). Pull firmware from kernel-firmware instead.
- drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bug#1109038).
- drivers: hv: vmbus: Add comments on ring buffer signaling (bug#1109038).
- drivers: hv: vmbus: add numa_node to sysfs (bug#1109038).
- drivers: hv: vmbus: Cleanup synic memory free path (bug#1109038).
- drivers: hv: vmbus: do not mark HV_PCIE as perf_device (bug#1109038).
- drivers: hv: vmbus: enable VMBus protocol version 5.0 (bug#1109038).
- drivers: hv: vmbus: Expose per-channel interrupts and events counters (bsc#1109038).
- drivers: hv: vmbus: Fix a rescind issue (bsc#1109038).
- drivers: hv: vmbus: Fix bugs in rescind handling (bug#1109038).
- drivers: hv: vmbus: Fix ring buffer signaling (bug#1109038).
- drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bug#1109038).
- drivers: hv: vmbus: Fix the offer_in_progress in vmbus_process_offer() (bug#1109038).
- drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bug#1109038).
- drivers: hv: vmbus: Make panic reporting to be more useful (bsc#1109038).
- drivers: hv: vmbus: Make TLFS #define names architecture neutral (bug#1109038).
- drivers: hv: vmbus: Removed an unnecessary cast from void * (bug#1109038).
- drivers: hv: vmbus: Remove use of slow_virt_to_phys() (bug#1109038).
- drivers: hv: vmbus: Remove x86-isms from arch independent drivers (bsc#1109038).
- drivers: hv: vmbus: Remove x86 MSR refs in arch independent code (bug#1109038).
- drivers: hv: vmbus: Reset the channel callback in vmbus_onoffer_rescind() (bug#1109038).
- drivers: hv: vmbus: respect what we get from hv_get_synint_state() (bug#1109038).
- drivers: hv: vmbus: Use get/put_cpu() in vmbus_connect() (bug#1109038).
- drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bug#1109038).
- drivers: net: cpsw: fix parsing of phy-handle DT property in dual_emac config (bnc#1012382).
- drivers: net: cpsw: fix segfault in case of bad phy-handle (bnc#1012382).
- drivers/tty: add error handling for pcmcia_loop_config (bnc#1012382).
- drm/amdgpu: Fix SDMA HQD destroy error on gfx_v7 (bnc#1012382).
- drm/amdkfd: Fix error codes in kfd_get_process (bnc#1012382).
- drm/hisilicon: hibmc: Do not carry error code in HiBMC framebuffer (bsc#1113766)
- drm/hisilicon: hibmc: Do not overwrite fb helper surface depth (bsc#1113766)
- drm/nouveau/drm/nouveau: Use pm_runtime_get_noresume() in connector_detect() (bnc#1012382).
- drm/nouveau/TBDdevinit: do not fail when PMU/PRE_OS is missing from VBIOS (bnc#1012382).
- drm/nouveau: tegra: Detach from ARM DMA/IOMMU mapping (bnc#1012382).
- drm/virtio: fix bounds check in virtio_gpu_cmd_get_capset() (bsc#1106929)
- Drop dtb-source.spec and move the sources to kernel-source (bsc#1011920)
- e1000: check on netif_running() before calling e1000_up() (bnc#1012382).
- e1000: ensure to free old tx/rx rings in set_ringparam() (bnc#1012382).
- ebtables: arpreply: Add the standard target sanity check (bnc#1012382).
- edac: Fix memleak in module init error path (bsc#1109441).
- edac, i7core: Fix memleaks and use-after-free on probe and remove (1109441).
- edac, thunderx: Fix memory leak in thunderx_l2c_threaded_isr() (bsc#1114648).
- ethernet: ti: davinci_emac: add missing of_node_put after calling of_parse_phandle (bnc#1012382).
- ethtool: Remove trailing semicolon for static inline (bnc#1012382).
- ethtool: restore erroneously removed break in dev_ethtool (bsc#1114229).
- ext4: avoid divide by zero fault when deleting corrupted inline directories (bnc#1012382).
- ext4: do not mark mmp buffer head dirty (bnc#1012382).
- ext4: fix online resize's handling of a too-small final block group (bnc#1012382).
- ext4: fix online resizing for bigalloc file systems with a 1k block size (bnc#1012382).
- ext4: recalucate superblock checksum after updating free blocks/inodes (bnc#1012382).
- f2fs: do not set free of current section (bnc#1012382).
- f2fs: fix to do sanity check with {sit,nat}_ver_bitmap_bytesize (bnc#1012382).
- fat: validate ->i_start before using (bnc#1012382).
- fbdev: Distinguish between interlaced and progressive modes (bnc#1012382).
- fbdev: fix broken menu dependencies (bsc#1106929)
- fbdev/omapfb: fix omapfb_memory_read infoleak (bnc#1012382).
- fbdev/via: fix defined but not used warning (bnc#1012382).
- Fixes: Commit cdbf92675fad ('mm: numa: avoid waiting on freed migrated pages') (bnc#1012382).
- fix init of hv_vp_index on SMP
- floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl (bnc#1012382).
- fork: do not copy inconsistent signal handler state to child (bnc#1012382).
- fs/cifs: do not translate SFM_SLASH (U+F026) to backslash (bnc#1012382).
- fs/cifs: suppress a string overflow warning (bnc#1012382).
- fs/dcache.c: fix kmemcheck splat at take_dentry_name_snapshot() (bnc#1012382).
- fs/eventpoll: loosen irq-safety when possible (bsc#1096052).
- genirq: Delay incrementing interrupt count if it's disabled/pending (bnc#1012382).
- gfs2: Special-case rindex for gfs2_grow (bnc#1012382).
- gpio: adp5588: Fix sleep-in-atomic-context bug (bnc#1012382).
- gpiolib: Mark gpio_suffixes array with __maybe_unused (bnc#1012382).
- gpio: ml-ioh: Fix buffer underwrite on probe error path (bnc#1012382).
- gpio: tegra: Move driver registration to subsys_init level (bnc#1012382).
- gso_segment: Reset skb->mac_len after modifying network header (bnc#1012382).
- hexagon: modify ffs() and fls() to return int (bnc#1012382).
- hfsplus: do not return 0 when fill_super() failed (bnc#1012382).
- hfs: prevent crash on exit from failed search (bnc#1012382).
- hid: hid-ntrig: add error handling for sysfs_create_group (bnc#1012382).
- hid: hyperv: pr_err() strings should end with newlines (bug#1109038).
- hid: sony: Support DS4 dongle (bnc#1012382).
- hid: sony: Update device ids (bnc#1012382).
- hv: add SPDX license id to Kconfig (bug#1109038).
- hv: add SPDX license to trace (bug#1109038).
- hv: avoid crash in vmbus sysfs files (bnc#1108377).
- hv_balloon: trace post_status (bug#1109038).
- hv_netvsc: Add handlers for ethtool get/set msg level (bug#1109038).
- hv_netvsc: Add NetVSP v6 and v6.1 into version negotiation (bug#1109038).
- hv_netvsc: Add per-cpu ethtool stats for netvsc (bug#1109038).
- hv_netvsc: Add range checking for rx packet offset and length (bug#1109038).
- hv_netvsc: add trace points (bug#1109038).
- hv_netvsc: avoid retry on send during shutdown (bug#1109038).
- hv_netvsc: avoid unnecessary wakeups on subchannel creation (bug#1109038).
- hv_netvsc: cancel subchannel setup before halting device (bug#1109038).
- hv_netvsc: change GPAD teardown order on older versions (bug#1109038).
- hv_netvsc: Clean up extra parameter from rndis_filter_receive_data() (bug#1109038).
- hv_netvsc: common detach logic (bug#1109038).
- hv_netvsc: disable NAPI before channel close (bug#1109038).
- hv_netvsc: Ensure correct teardown message sequence order (bug#1109038).
- hv_netvsc: Fix a deadlock by getting rtnl lock earlier in netvsc_probe() (bug#1109038).
- hv_netvsc: Fix a network regression after ifdown/ifup (bug#1109038).
- hv_netvsc: fix bogus ifalias on network device (bug#1109038).
- hv_netvsc: fix deadlock on hotplug (bug#1109038).
- hv_netvsc: fix error unwind handling if vmbus_open fails (bug#1109038).
- hv/netvsc: fix handling of fallback to single queue mode (bug#1109038).
- hv_netvsc: Fix napi reschedule while receive completion is busy (bug#1109038).
- hv_netvsc: Fix net device attach on older Windows hosts (bug#1109038).
- hv_netvsc: fix network namespace issues with VF support (bug#1109038).
- hv/netvsc: Fix NULL dereference at single queue mode fallback (bug#1109038).
- hv_netvsc: fix race in napi poll when rescheduling (bug#1109038).
- hv_netvsc: fix schedule in RCU context (bug#1109038).
- hv_netvsc: Fix the return status in RX path (bug#1109038).
- hv_netvsc: Fix the variable sizes in ipsecv2 and rsc offload (bug#1109038).
- hv_netvsc: fix vf serial matching with pci slot info (bug#1109038).
- hv_netvsc: ignore devices that are not PCI (bug#1109038).
- hv_netvsc: move VF to same namespace as netvsc device (bug#1109038).
- hv_netvsc: netvsc_teardown_gpadl() split (bsc#1109038).
- hv_netvsc: only wake transmit queue if link is up (bug#1109038).
- hv_netvsc: pair VF based on serial number (bug#1109038).
- hv_netvsc: Pass net_device parameter to revoke and teardown functions (bug#1109038).
- hv_netvsc: pass netvsc_device to rndis halt (bug#1109038).
- hv_netvsc: preserve hw_features on mtu/channels/ringparam changes (bsc#1109038).
- hv_netvsc: propogate Hyper-V friendly name into interface alias (bug#1109038).
- hv_netvsc: select needed ucs2_string routine (bug#1109038).
- hv_netvsc: set master device (bug#1109038).
- hv_netvsc: Set tx_table to equal weight after subchannels open (bsc#1109038).
- hv_netvsc: Simplify num_chn checking in rndis_filter_device_add() (bug#1109038).
- hv_netvsc: simplify receive side calling arguments (bug#1109038).
- hv_netvsc: Split netvsc_revoke_buf() and netvsc_teardown_gpadl() (bug#1109038).
- hv_netvsc: split sub-channel setup into async and sync (bug#1109038).
- hv_netvsc: typo in NDIS RSS parameters structure (bug#1109038).
- hv_netvsc: use napi_schedule_irqoff (bug#1109038).
- hv_netvsc: use RCU to fix concurrent rx and queue changes (bug#1109038).
- hv_netvsc: use reciprocal divide to speed up percent calculation (bsc#1109038).
- hv_netvsc: Use the num_online_cpus() for channel limit (bsc#1109038).
- hv_netvsc: Use Windows version instead of NVSP version on GPAD teardown (bug#1109038).
- hv: Synthetic typo correction (bug#1109038).
- hv_vmbus: Correct the stale comments regarding cpu affinity (bug#1109038).
- hwmon: (adt7475) Make adt7475_read_word() return errors (bnc#1012382).
- hwmon: (ina2xx) fix sysfs shunt resistor read access (bnc#1012382).
- hwrng: core - document the quality field (git-fixes).
- hyper-v: Globalize vp_index (bug#1109038).
- hyper-v: use GFP_KERNEL for hv_context.hv_numa_map (bug#1109038).
- i2c: i2c-scmi: fix for i2c_smbus_write_block_data (bnc#1012382).
- i2c: i801: Allow ACPI AML access I/O ports not reserved for SMBus (bnc#1012382).
- i2c: i801: fix DNV's SMBCTRL register offset (bnc#1012382).
- i2c: uniphier-f: issue STOP only for last message or I2C_M_STOP (bnc#1012382).
- i2c: uniphier: issue STOP only for last message or I2C_M_STOP (bnc#1012382).
- i2c: xiic: Make the start and the byte count write atomic (bnc#1012382).
- i2c: xlp9xx: Add support for SMBAlert (bsc#1103308).
- i2c: xlp9xx: Fix case where SSIF read transaction completes early (bsc#1103308).
- i2c: xlp9xx: Fix issue seen when updating receive length (bsc#1103308).
- i2c: xlp9xx: Make sure the transfer size is not more than I2C_SMBUS_BLOCK_SIZE (bsc#1103308).
- IB/ipoib: Avoid a race condition between start_xmit and cm_rep_handler (bnc#1012382).
- IB/srp: Avoid that sg_reset -d ${srp_device} triggers an infinite loop (bnc#1012382).
- ib_srp: Remove WARN_ON in srp_terminate_io() (bsc#1094562).
- Input: atakbd - fix Atari CapsLock behaviour (bnc#1012382).
- Input: atakbd - fix Atari keymap (bnc#1012382).
- Input: atmel_mxt_ts - only use first T9 instance (bnc#1012382).
- Input: elantech - enable middle button of touchpad on ThinkPad P72 (bnc#1012382).
- iommu/amd: Return devid as alias for ACPI HID devices (bsc#1106105).
- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bnc#1012382).
- iommu/ipmmu-vmsa: Fix allocation in atomic context (bnc#1012382).
- ip6_tunnel: be careful when accessing the inner header (bnc#1012382).
- ipmi:ssif: Add support for multi-part transmit messages > 2 parts (bsc#1103308).
- ip_tunnel: be careful when accessing the inner header (bnc#1012382).
- ipv4: fix use-after-free in ip_cmsg_recv_dstaddr() (bnc#1012382).
- ipv6: fix possible use-after-free in ip6_xmit() (bnc#1012382).
- ipvs: fix race between ip_vs_conn_new() and ip_vs_del_dest() (bnc#1012382).
- irqchip/bcm7038-l1: Hide cpu offline callback when building for !SMP (bnc#1012382).
- irqchip/gic-v3: Add missing barrier to 32bit version of gic_read_iar() (bnc#1012382).
- iw_cxgb4: only allow 1 flush on user qps (bnc#1012382).
- ixgbe: pci_set_drvdata must be called before register_netdev (Git-fixes bsc#1109923).
- jffs2: return -ERANGE when xattr buffer is too small (bnc#1012382).
- KABI: move the new handler to end of machdep_calls and hide it from genksyms (bsc#1094244).
- kabi.pl: Consider GPL vs. non-GPL exports ()
- kabi protect hnae_ae_ops (bsc#1107924).
- kABI: protect struct hnae_desc_cb (kabi).
- kbuild: add .DELETE_ON_ERROR special target (bnc#1012382).
- kbuild: make missing $DEPMOD a Warning instead of an Error (bnc#1012382).
- kernel-{binary,docs}.spec sort dependencies.
- kernel-binary: pass ARCH= to kernel build Recent kernel does not save CONFIG_64BIT so it has to be specified by arch.
- kernel-binary: pass MAKE_ARGS to install script as well.
- kernel-binary.spec Remove superfluous [].
- kernel-binary undefine unique_debug_names Some tools do not understand names like usr/lib/debug/boot/vmlinux-4.12.14-11.10-default-4.12.14-11.10.ppc64le.debug
- kernel-obs-build.spec.in: add --no-hostonly-cmdline to dracut invocation (boo#1062303). call dracut with --no-hostonly-cmdline to avoid the random rootfs UUID being added into the initrd's /etc/cmdline.d/95root-dev.conf
- kernel-obs-build.spec.in: enable xfs module This allows the public cloud team to build images with XFS as root filesystem
- kernel-obs-build: use pae and lpae kernels where available (bsc#1073579).
- kernel/params.c: downgrade warning for unsafe parameters (bsc#1050549).
- kernel-source.spec: Align source numbering.
- kernel-*.spec: remove remaining occurences of %release from dependencies There is a mix of %release and %source_rel in manually added dependencies and the %release dependencies tend to fail due to rebuild sync issues. So get rid of them.
- kprobes/x86: Release insn_slot in failure path (bsc#1110006).
- kthread: fix boot hang (regression) on MIPS/OpenRISC (bnc#1012382).
- kthread: Fix use-after-free if kthread fork fails (bnc#1012382).
- KVM: nVMX: Do not expose MPX VMX controls when guest MPX disabled (bsc#1106240).
- KVM: nVMX: Do not flush TLB when vmcs12 uses VPID (bsc#1106240).
- KVM: PPC: Book3S HV: Do not truncate HPTE index in xlate function (bnc#1012382).
- KVM: x86: Do not re-{try,execute} after failed emulation in L2 (bsc#1106240).
- KVM: x86: Do not use kvm_x86_ops->mpx_supported() directly (bsc#1106240).
- KVM: x86: fix APIC page invalidation (bsc#1106240).
- KVM: x86: remove eager_fpu field of struct kvm_vcpu_arch (bnc#1012382).
- KVM/x86: remove WARN_ON() for when vm_munmap() fails (bsc#1106240).
- KVM: x86: SVM: Call x86_spec_ctrl_set_guest/host() with interrupts disabled (bsc#1106240).
- l2tp: cast l2tp traffic counter to unsigned (bsc#1099810).
- lib/test_hexdump.c: fix failure on big endian cpu (bsc#1106110).
- Limit kernel-source build to architectures for which we build binaries (bsc#1108281).
- locking/osq_lock: Fix osq_lock queue corruption (bnc#1012382).
- locking/rwsem-xadd: Fix missed wakeup due to reordering of load (bnc#1012382).
- lpfc: fixup crash in lpfc_els_unsol_buffer() (bsc#1107318).
- mac80211: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bnc#1012382).
- mac80211: fix a race between restart and CSA flows (bnc#1012382).
- mac80211: fix setting IEEE80211_KEY_FLAG_RX_MGMT for AP mode keys (bnc#1012382).
- mac80211: Fix station bandwidth setting after channel switch (bnc#1012382).
- mac80211_hwsim: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bnc#1012382).
- mac80211: mesh: fix HWMP sequence numbering to follow standard (bnc#1012382).
- mac80211: restrict delayed tailroom needed decrement (bnc#1012382).
- mac80211: shorten the IBSS debug messages (bnc#1012382).
- mach64: detect the dot clock divider correctly on sparc (bnc#1012382).
- macintosh/via-pmu: Add missing mmio accessors (bnc#1012382).
- macros.kernel-source: define linux_arch for KMPs (boo#1098050). CONFIG_64BIT is no longer defined so KMP spec files need to include %{?linux_make_arch} in any make call to build modules or descent into the kernel directory for any reason.
- macros.kernel-source: Fix building non-x86 KMPs
- macros.kernel-source: ignore errors when using make to print kernel release There is no way to handle the errors anyway and including the error into package version does not give good results.
- macros.kernel-source: pass -b properly in kernel module package (bsc#1107870).
- macros.kernel-source: pass -f properly in module subpackage (boo#1076393).
- md-cluster: clear another node's suspend_area after the copy is finished (bnc#1012382).
- md/raid1: exit sync request if MD_RECOVERY_INTR is set (git-fixes).
- md/raid5: fix data corruption of replacements after originals dropped (bnc#1012382).
- media: af9035: prevent buffer overflow on write (bnc#1012382).
- media: exynos4-is: Prevent NULL pointer dereference in __isp_video_try_fmt() (bnc#1012382).
- media: fsl-viu: fix error handling in viu_of_probe() (bnc#1012382).
- media: omap3isp: zero-initialize the isp cam_xclk{a,b} initial data (bnc#1012382).
- media: omap_vout: Fix a possible null pointer dereference in omap_vout_open() (bsc#1050431).
- media: s3c-camif: ignore -ENOIOCTLCMD from v4l2_subdev_call for s_power (bnc#1012382).
- media: soc_camera: ov772x: correct setting of banding filter (bnc#1012382).
- media: tm6000: add error handling for dvb_register_adapter (bnc#1012382).
- media: uvcvideo: Support realtek's UVC 1.5 device (bnc#1012382).
- media: v4l: event: Prevent freeing event subscriptions while accessed (bnc#1012382).
- media: videobuf2-core: check for q->error in vb2_core_qbuf() (bnc#1012382).
- media: videobuf-dma-sg: Fix dma_{sync,unmap}_sg() calls (bsc#1050431).
- mei: bus: type promotion bug in mei_nfc_if_version() (bnc#1012382).
- mei: me: allow runtime pm for platform with D0i3 (bnc#1012382).
- memory_hotplug: cond_resched in __remove_pages (bnc#1114178).
- mfd: omap-usb-host: Fix dts probe of children (bnc#1012382).
- mfd: sm501: Set coherent_dma_mask when creating subdevices (bnc#1012382).
- mfd: ti_am335x_tscadc: Fix struct clk memory leak (bnc#1012382).
- MIPS: ath79: fix system restart (bnc#1012382).
- MIPS: Fix ISA virt/bus conversion for non-zero PHYS_OFFSET (bnc#1012382).
- MIPS: jz4740: Bump zload address (bnc#1012382).
- MIPS: loongson64: cs5536: Fix PCI_OHCI_INT_REG reads (bnc#1012382).
- MIPS: Octeon: add missing of_node_put() (bnc#1012382).
- MIPS: VDSO: Match data page cache colouring when D$ aliases (bnc#1012382).
- MIPS: WARN_ON invalid DMA cache maintenance, not BUG_ON (bnc#1012382).
- misc: hmc6352: fix potential Spectre v1 (bnc#1012382).
- misc: mic: SCIF Fix scif_get_new_port() error handling (bnc#1012382).
- misc: ti-st: Fix memory leak in the error path of probe() (bnc#1012382).
- mkspec: do not build dtbs for architectures with no kernel.
- mkspec: fix perl warning
- mkspec: only build docs for default variant kernel.
- mmc: mmci: stop building qcom dml as module (bsc#1110468).
- mm/fadvise.c: fix signed overflow UBSAN complaint (bnc#1012382).
- mm: fix devmem_is_allowed() for sub-page System RAM intersections (bsc#1110006).
- mm: get rid of vmacache_flush_all() entirely (bnc#1012382).
- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (bnc#1012382).
- mm: /proc/pid/pagemap: hide swap entries from unprivileged users (Git-fixes bsc#1109907).
- mm: shmem.c: Correctly annotate new inodes for lockdep (bnc#1012382).
- mm/vmstat.c: fix outdated vmstat_text (bnc#1012382).
- mm/vmstat.c: skip NR_TLB_REMOTE_FLUSH* properly (bnc#1012382).
- mm/vmstat.c: skip NR_TLB_REMOTE_FLUSH* properly (git fixes).
- module: exclude SHN_UNDEF symbols from kallsyms api (bnc#1012382).
- move changes without Git-commit out of sorted section
- mtdchar: fix overflows in adjustment of `count` (bnc#1012382).
- mtd/maps: fix solutionengine.c printk format warnings (bnc#1012382).
- neighbour: confirm neigh entries when ARP packet is received (bnc#1012382).
- net/9p: fix error path of p9_virtio_probe (bnc#1012382).
- net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT (bnc#1012382).
- net: bcmgenet: use MAC link status for fixed phy (bnc#1012382).
- net: cadence: Fix a sleep-in-atomic-context bug in macb_halt_tx() (bnc#1012382).
- net: dcb: For wild-card lookups, use priority -1, not 0 (bnc#1012382).
- net: ena: Eliminate duplicate barriers on weakly-ordered archs (bsc#1108240).
- net: ena: fix device destruction to gracefully free resources (bsc#1108240).
- net: ena: fix driver when PAGE_SIZE == 64kB (bsc#1108240).
- net: ena: fix incorrect usage of memory barriers (bsc#1108240).
- net: ena: fix missing calls to READ_ONCE (bsc#1108240).
- net: ena: fix missing lock during device destruction (bsc#1108240).
- net: ena: fix potential double ena_destroy_device() (bsc#1108240).
- net: ena: fix surprise unplug NULL dereference kernel crash (bsc#1108240).
- net: ethernet: mvneta: Fix napi structure mixup on armada 3700 (bsc#1110616).
- net: ethernet: ti: cpsw: fix mdio device reference leak (bnc#1012382).
- netfilter: x_tables: avoid stack-out-of-bounds read in xt_copy_counters_from_user (bnc#1012382).
- net: hns: add netif_carrier_off before change speed and duplex (bsc#1107924).
- net: hns: add the code for cleaning pkt in chip (bsc#1107924).
- net: hns: fix length and page_offset overflow when CONFIG_ARM64_64K_PAGES (bnc#1012382).
- net: hp100: fix always-true check for link up state (bnc#1012382).
- net: ipv4: update fnhe_pmtu when first hop's MTU changes (bnc#1012382).
- net/ipv6: Display all addresses in output of /proc/net/if_inet6 (bnc#1012382).
- netlabel: check for IPV4MASK in addrinfo_get (bnc#1012382).
- net: macb: disable scatter-gather for macb on sama5d3 (bnc#1012382).
- net/mlx4: Use cpumask_available for eq->affinity_mask (bnc#1012382).
- net: mvneta: fix mtu change on port without link (bnc#1012382).
- net: mvneta: fix mvneta_config_rss on armada 3700 (bsc#1110615).
- net: mvpp2: Extract the correct ethtype from the skb for tx csum offload (bnc#1012382).
- net: systemport: Fix wake-up interrupt race during resume (bnc#1012382).
- net/usb: cancel pending work when unbinding smsc75xx (bnc#1012382).
- netvsc: delay setup of VF device (bug#1109038).
- netvsc: fix race during initialization (bug#1109038).
- netvsc: fix race on sub channel creation (bug#1109038).
- netvsc: remove bonding setup script (bug#1109038).
- NFC: Fix possible memory corruption when handling SHDLC I-Frame commands (bnc#1012382).
- NFC: Fix the number of pipes (bnc#1012382).
- NFS: add nostatflush mount option (bsc#1065726).
- NFS: Avoid quadratic search when freeing delegations (bsc#1084760).
- nfsd: fix corrupted reply to badly ordered compound (bnc#1012382).
- NFS: Use an appropriate work queue for direct-write completion (bsc#1082519).
- NFSv4.0 fix client reference leak in callback (bnc#1012382).
- nvme_fc: add 'nvme_discovery' sysfs attribute to fc transport device (bsc#1044189).
- nvmet: fixup crash on NULL device path (bsc#1082979).
- ocfs2: fix locking for res->tracking and dlm->tracking_list (bnc#1012382).
- ocfs2: fix ocfs2 read block panic (bnc#1012382).
- of: unittest: Disable interrupt node tests for old world MAC systems (bnc#1012382).
- ovl: Copy inode attributes after setting xattr (bsc#1107299).
- ovl: modify ovl_permission() to do checks on two inodes (bsc#1106512)
- ovl: proper cleanup of workdir (bnc#1012382).
- ovl: rename is_merge to is_lowest (bnc#1012382).
- parport: sunbpp: fix error return code (bnc#1012382).
- partitions/aix: append null character to print data from disk (bnc#1012382).
- partitions/aix: fix usage of uninitialized lv_info and lvname structures (bnc#1012382).
- Pass x86 as architecture on x86_64 and i386 (bsc#1093118).
- pci: altera: Fix bool initialization in tlp_read_packet() (bsc#1109806).
- pci: designware: Fix I/O space page leak (bsc#1109806).
- pci: designware: Fix pci_remap_iospace() failure path (bsc#1109806).
- pci: hv: Convert remove_lock to refcount (bug#1109038).
- pci: hv: Do not wait forever on a device that has disappeared (bug#1109038).
- pci: hv: Fix return value check in hv_pci_assign_slots() (bug#1109038).
- pci: hv: Make sure the bus domain is really unique (bug#1109038).
- pci: hv: Remove unused reason for refcount handler (bug#1109038).
- pci: hv: Replace GFP_ATOMIC with GFP_KERNEL in new_pcichild_device() (bug#1109038).
- pci: hv: support reporting serial number as slot information (bug#1109038).
- pci: hv: Use effective affinity mask (bsc#1109038).
- pci: hv: Use effective affinity mask (bsc#1109772).
- pci: hv: Use list_for_each_entry() (bug#1109038).
- pci: mvebu: Fix I/O space end address calculation (bnc#1012382).
- pci: OF: Fix I/O space page leak (bsc#1109806).
- pci: pciehp: Fix unprotected list iteration in IRQ handler (bsc#1109806).
- pci: Reprogram bridge prefetch registers on resume (bnc#1012382).
- pci: shpchp: Fix AMD POGO identification (bsc#1109806).
- pci: Supply CPU physical address (not bus address) to iomem_is_exclusive() (bsc#1109806).
- pci: versatile: Fix I/O space page leak (bsc#1109806).
- pci: versatile: Fix pci_remap_iospace() failure path (bsc#1109806).
- pci: xgene: Fix I/O space page leak (bsc#1109806).
- pci: xilinx: Add missing of_node_put() (bsc#1109806).
- perf powerpc: Fix callchain ip filtering (bnc#1012382).
- perf powerpc: Fix callchain ip filtering when return address is in a register (bnc#1012382).
- perf probe powerpc: Ignore SyS symbols irrespective of endianness (bnc#1012382).
- perf script python: Fix export-to-postgresql.py occasional failure (bnc#1012382).
- perf tools: Allow overriding MAX_NR_CPUS at compile time (bnc#1012382).
- phy: qcom-ufs: add MODULE_LICENSE tag (bsc#1110468).
- pinctrl: qcom: spmi-gpio: Fix pmic_gpio_config_get() to be compliant (bnc#1012382).
- pipe: actually allow root to exceed the pipe buffer limit (git-fixes).
- platform/x86: alienware-wmi: Correct a memory leak (bnc#1012382).
- platform/x86: asus-nb-wmi: Add keymap entry for lid flip action on UX360 (bnc#1012382).
- platform/x86: toshiba_acpi: Fix defined but not used build warnings (bnc#1012382).
- PM / core: Clear the direct_complete flag on errors (bnc#1012382).
- powerpc/64: Do load of PACAKBASE in LOAD_HANDLER (bsc#1094244).
- powerpc/64s: move machine check SLB flushing to mm/slb.c (bsc#1094244).
- powerpc/book3s: Fix MCE console messages for unrecoverable MCE (bsc#1094244).
- powerpc/fadump: cleanup crash memory ranges support (bsc#1103269).
- powerpc/fadump: re-register firmware-assisted dump if already registered (bsc#1108170, bsc#1108823).
- powerpc: Fix size calculation using resource_size() (bnc#1012382).
- powerpc/kdump: Handle crashkernel memory reservation failure (bnc#1012382).
- powerpc/mce: Fix SLB rebolting during MCE recovery path (bsc#1094244).
- powerpc/mce: Move 64-bit machine check code into mce.c (bsc#1094244).
- powerpc/numa: Skip onlining a offline node in kdump path (bsc#1109784).
- powerpc/numa: Use associativity if VPHN hcall is successful (bsc#1110363).
- powerpc/perf/hv-24x7: Fix off-by-one error in request_buffer check (git-fixes).
- powerpc/perf/hv-24x7: Fix passing of catalog version number (bsc#1053043).
- powerpc/powernv/ioda2: Reduce upper limit for DMA window size (bsc#1066223).
- powerpc/powernv: opal_put_chars partial write fix (bnc#1012382).
- powerpc/powernv: Rename machine_check_pSeries_early() to powernv (bsc#1094244).
- powerpc/pseries: Avoid using the size greater than RTAS_ERROR_LOG_MAX (bnc#1012382).
- powerpc/pseries: Defer the logging of rtas error to irq work queue (bsc#1094244).
- powerpc/pseries: Define MCE error event section (bsc#1094244).
- powerpc/pseries: Disable CPU hotplug across migrations (bsc#1066223).
- powerpc/pseries: Display machine check error details (bsc#1094244).
- powerpc/pseries: Dump the SLB contents on SLB MCE errors (bsc#1094244).
- powerpc/pseries: Fix build break for SPLPAR=n and CPU hotplug (bsc#1079524, git-fixes).
- powerpc/pseries: Fix CONFIG_NUMA=n build (bsc#1067906, git-fixes).
- powerpc/pseries: Flush SLB contents on SLB MCE errors (bsc#1094244).
- powerpc/pseries/mm: call H_BLOCK_REMOVE (bsc#1109158).
- powerpc/pseries/mm: factorize PTE slot computation (bsc#1109158).
- powerpc/pseries/mm: Introducing FW_FEATURE_BLOCK_REMOVE (bsc#1109158).
- powerpc/pseries: Remove prrn_work workqueue (bsc#1102495, bsc#1109337).
- powerpc/pseries: Remove unneeded uses of dlpar work queue (bsc#1102495, bsc#1109337).
- powerpc/rtas: Fix a potential race between CPU-Offline & Migration (bsc#1111870).
- powerpc/tm: Avoid possible userspace r1 corruption on reclaim (bsc#1109333).
- powerpc/tm: Fix userspace r13 corruption (bsc#1109333).
- power: vexpress: fix corruption in notifier registration (bnc#1012382).
- printk: do not spin in printk when in nmi (bsc#1094244).
- proc: restrict kernel stack dumps to root (bnc#1012382).
- pstore: Fix incorrect persistent ram buffer mapping (bnc#1012382).
- qlcnic: fix Tx descriptor corruption on 82xx devices (bnc#1012382).
- r8169: Clear RTL_FLAG_TASK_*_PENDING when clearing RTL_FLAG_TASK_ENABLED (bnc#1012382).
- RAID10 BUG_ON in raise_barrier when force is true and conf->barrier is 0 (bnc#1012382).
- rculist: add list_for_each_entry_from_rcu() (bsc#1084760).
- rculist: Improve documentation for list_for_each_entry_from_rcu() (bsc#1084760).
- RDMA/cma: Do not ignore net namespace for unbound cm_id (bnc#1012382).
- RDMA/cma: Protect cma dev list with lock (bnc#1012382).
- RDMA/rw: Fix rdma_rw_ctx_signature_init() kernel-doc header (bsc#1082979).
- RDMA/ucma: check fd type in ucma_migrate_id() (bnc#1012382).
- README: Clean-up trailing whitespace
- reiserfs: add check to detect corrupted directory entry (bsc#1109818).
- reiserfs: change j_timestamp type to time64_t (bnc#1012382).
- reiserfs: do not panic on bad directory entries (bsc#1109818).
- resource: Include resource end in walk_*() interfaces (bsc#1114648).
- Revert 'ARM: imx_v6_v7_defconfig: Select ULPI support' (bnc#1012382).
- Revert 'btrfs: qgroups: Retry after commit on getting EDQUOT' (bsc#1031392).
- Revert 'dma-buf/sync-file: Avoid enable fence signaling if poll(.timeout=0)' (bsc#1111363).
- Revert 'drm: Do not pass negative delta to ktime_sub_ns()' (bsc#1106929)
- Revert 'drm/i915: Initialize HWS page address after GPU reset' (bsc#1106929)
- Revert 'Drop kernel trampoline stack.' This reverts commit 85dead31706c1c1755adff90405ff9861c39c704.
- Revert 'kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)' This reverts commit edde1f21880e3bfe244c6f98a3733b05b13533dc.
- Revert 'KVM: x86: remove eager_fpu field of struct kvm_vcpu_arch' (kabi).
- Revert 'media: v4l: event: Prevent freeing event subscriptions while accessed' (kabi).
- Revert 'mm: get rid of vmacache_flush_all() entirely' (kabi).
- Revert 'proc: restrict kernel stack dumps to root' (kabi).
- Revert 'Skip intel_crt_init for Dell XPS 8700' (bsc#1106929)
- Revert 'usb: cdc-wdm: Fix a sleep-in-atomic-context bug in service_outstanding_interrupt()' (bnc#1012382).
- ring-buffer: Allow for rescheduling when removing pages (bnc#1012382).
- rndis_wlan: potential buffer overflow in rndis_wlan_auth_indication() (bnc#1012382).
- rpm/kernel-binary.spec.in: Check module licenses (bsc#1083215,bsc#1083527)
- rpm/kernel-binary.spec.in: Do not sign modules if CONFIG_MODULE_SIG=n (bsc#1035053)
- rpm/kernel-binary.spec.in: Obsolete ftsteutates KMP (boo#997172)
- rpm/kernel-binary.spec.in: Only kernel-syzkaller needs gcc-devel (boo#1043591).
- rpm/kernel-docs.spec.in: Expand kernel tree directly from sources (bsc#1057199)
- rpm/kernel-docs.spec.in: refresh dependencies for PDF build (bsc#1048129)
- rpm/kernel-module-subpackage: Generate proper supplements in the template ... instead of relying on find-provides.ksyms to do it (bsc#981083).
- rpm/kernel-source.spec.in: Do not list deleted depdendency helpers (bsc#981083).
- rpm/kernel-spec-macros: Try harder to detect Build Service environment (bsc#1078788)
- rpmsg: Correct support for MODULE_DEVICE_TABLE() (git-fixes).
- rtc: bq4802: add error handling for devm_ioremap (bnc#1012382).
- rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096 (bnc#1012382).
- s390/chsc: Add exception handler for CHSC instruction (git-fixes).
- s390/dasd: fix hanging offline processing due to canceled worker (bnc#1012382).
- s390/extmem: fix gcc 8 stringop-overflow warning (bnc#1012382).
- s390/facilites: use stfle_fac_list array size for MAX_FACILITY_BIT (bnc#1108315, LTC#171326).
- s390/kdump: Fix elfcorehdr size calculation (git-fixes).
- s390/kdump: Make elfcorehdr size calculation ABI compliant (git-fixes).
- s390/lib: use expoline for all bcr instructions (LTC#171029 bnc#1012382 bnc#1106934).
- s390/mm: correct allocate_pgste proc_handler callback (git-fixes).
- s390/qeth: do not dump past end of unknown HW header (bnc#1012382).
- s390/qeth: fix race in used-buffer accounting (bnc#1012382).
- s390/qeth: handle failure on workqueue creation (git-fixes).
- s390/qeth: reset layer2 attribute on layer switch (bnc#1012382).
- s390/qeth: use vzalloc for QUERY OAT buffer (bnc#1108315, LTC#171527).
- s390: revert ELF_ET_DYN_BASE base changes (git-fixes).
- s390/stacktrace: fix address ranges for asynchronous and panic stack (git-fixes).
- sched/fair: Fix bandwidth timer clock drift condition (Git-fixes).
- sched/fair: Fix vruntime_normalized() for remote non-migration wakeup (Git-fixes).
- sched/isolcpus: Fix 'isolcpus=' boot parameter handling when !CONFIG_CPUMASK_OFFSTACK (bug#1109038).
- sch_hhf: fix null pointer dereference on init failure (bnc#1012382).
- sch_htb: fix crash on init failure (bnc#1012382).
- sch_multiq: fix double free on init failure (bnc#1012382).
- sch_netem: avoid null pointer deref on init failure (bnc#1012382).
- sch_tbf: fix two null pointer dereferences on init failure (bnc#1012382).
- scripts: modpost: check memory allocation results (bnc#1012382).
- scsi: 3ware: fix return 0 on the error path of probe (bnc#1012382).
- scsi: aic94xx: fix an error code in aic94xx_init() (bnc#1012382).
- scsi: bnx2i: add error handling for ioremap_nocache (bnc#1012382).
- scsi: ibmvscsi: Improve strings handling (bnc#1012382).
- scsi: ipr: System hung while dlpar adding primary ipr adapter back (bsc#1109336).
- scsi: klist: Make it safe to use klists in atomic context (bnc#1012382).
- scsi: netvsc: Use the vmbus function to calculate ring buffer percentage (bug#1109038).
- scsi: qla2xxx: Add changes for devloss timeout in driver (bsc#1084427).
- scsi: qla2xxx: Add FC-NVMe abort processing (bsc#1084427).
- scsi: qla2xxx: Add longer window for chip reset (bsc#1094555).
- scsi: qla2xxx: Avoid double completion of abort command (bsc#1094555).
- scsi: qla2xxx: Cleanup code to improve FC-NVMe error handling (bsc#1084427).
- scsi: qla2xxx: Cleanup for N2N code (bsc#1094555).
- scsi: qla2xxx: correctly shift host byte (bsc#1094555).
- scsi: qla2xxx: Correct setting of SAM_STAT_CHECK_CONDITION (bsc#1094555).
- scsi: qla2xxx: Delete session for nport id change (bsc#1094555).
- scsi: qla2xxx: Fix Async GPN_FT for FCP and FC-NVMe scan (bsc#1084427).
- scsi: qla2xxx: Fix crash on qla2x00_mailbox_command (bsc#1094555).
- scsi: qla2xxx: Fix double free bug after firmware timeout (bsc#1094555).
- scsi: qla2xxx: Fix driver unload by shutting down chip (bsc#1094555).
- scsi: qla2xxx: fix error message on <qla2400 (bsc#1094555).
- scsi: qla2xxx: Fix FC-NVMe IO abort during driver reset (bsc#1084427).
- scsi: qla2xxx: Fix function argument descriptions (bsc#1094555).
- scsi: qla2xxx: Fix Inquiry command being dropped in Target mode (bsc#1094555).
- scsi: qla2xxx: Fix issue reported by static checker for qla2x00_els_dcmd2_sp_done() (bsc#1094555).
- scsi: qla2xxx: Fix login retry count (bsc#1094555).
- scsi: qla2xxx: Fix Management Server NPort handle reservation logic (bsc#1094555).
- scsi: qla2xxx: Fix memory leak for allocating abort IOCB (bsc#1094555).
- scsi: qla2xxx: Fix n2n_ae flag to prevent dev_loss on PDB change (bsc#1084427).
- scsi: qla2xxx: Fix N2N link re-connect (bsc#1094555).
- scsi: qla2xxx: Fix NPIV deletion by calling wait_for_sess_deletion (bsc#1094555).
- scsi: qla2xxx: Fix race between switch cmd completion and timeout (bsc#1094555).
- scsi: qla2xxx: Fix race condition between iocb timeout and initialisation (bsc#1094555).
- scsi: qla2xxx: Fix redundant fc_rport registration (bsc#1094555).
- scsi: qla2xxx: Fix retry for PRLI RJT with reason of BUSY (bsc#1084427).
- scsi: qla2xxx: Fix Rport and session state getting out of sync (bsc#1094555).
- scsi: qla2xxx: Fix sending ADISC command for login (bsc#1094555).
- scsi: qla2xxx: Fix session state stuck in Get Port DB (bsc#1094555).
- scsi: qla2xxx: Fix stalled relogin (bsc#1094555).
- scsi: qla2xxx: Fix TMF and Multi-Queue config (bsc#1094555).
- scsi: qla2xxx: Fix unintended Logout (bsc#1094555).
- scsi: qla2xxx: Fix unintialized List head crash (bsc#1094555).
- scsi: qla2xxx: Flush mailbox commands on chip reset (bsc#1094555).
- scsi: qla2xxx: fx00 copypaste typo (bsc#1094555).
- scsi: qla2xxx: Migrate NVME N2N handling into state machine (bsc#1094555).
- scsi: qla2xxx: Move GPSC and GFPNID out of session management (bsc#1094555).
- scsi: qla2xxx: Prevent relogin loop by removing stale code (bsc#1094555).
- scsi: qla2xxx: Prevent sysfs access when chip is down (bsc#1094555).
- scsi: qla2xxx: Reduce redundant ADISC command for RSCNs (bsc#1094555).
- scsi: qla2xxx: remove irq save in qla2x00_poll() (bsc#1094555).
- scsi: qla2xxx: Remove nvme_done_list (bsc#1084427).
- scsi: qla2xxx: Remove stale debug value for login_retry flag (bsc#1094555).
- scsi: qla2xxx: Remove unneeded message and minor cleanup for FC-NVMe (bsc#1084427).
- scsi: qla2xxx: Restore ZIO threshold setting (bsc#1084427).
- scsi: qla2xxx: Return busy if rport going away (bsc#1084427).
- scsi: qla2xxx: Save frame payload size from ICB (bsc#1094555).
- scsi: qla2xxx: Set IIDMA and fcport state before qla_nvme_register_remote() (bsc#1084427).
- scsi: qla2xxx: Silent erroneous message (bsc#1094555).
- scsi: qla2xxx: Update driver version to 10.00.00.06-k (bsc#1084427).
- scsi: qla2xxx: Update driver version to 10.00.00.07-k (bsc#1094555).
- scsi: qla2xxx: Update driver version to 10.00.00.08-k (bsc#1094555).
- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1094555).
- scsi: qla2xxx: Use predefined get_datalen_for_atio() inline function (bsc#1094555).
- scsi: scsi_transport_fc: Add dummy initiator role to rport (bug#1109038).
- scsi: storsvc: do not set a bounce limit (bug#1109038).
- scsi: storvsc: Add support for FC rport (bug#1109038).
- scsi: storvsc: Allow only one remove lun work item to be issued per lun (bsc#1109038).
- scsi: storvsc: Avoid allocating memory for temp cpumasks (bug#1109038).
- scsi: storvsc: Avoid excessive host scan on controller change (bsc#1109038).
- scsi: storvsc: missing error code in storvsc_probe() (bsc#1109038).
- scsi: storvsc: Select channel based on available percentage of ring buffer to write (bug#1109038).
- scsi: storvsc: Set up correct queue depth values for IDE devices (bug#1109038).
- scsi: storvsc: Spread interrupts when picking a channel for I/O requests (bug#1109038).
- scsi: storvsc: use default I/O timeout handler for FC devices (bug#1109038).
- scsi: storvsc: use in place iterator function (bug#1109038).
- scsi: target: fix __transport_register_session locking (bnc#1012382).
- scsi: target/iscsi: Make iscsit_ta_authentication() respect the output buffer size (bnc#1012382).
- scsi: vmbus: Add function to report available ring buffer to write in total ring size percentage (bug#1109038).
- selftests/efivarfs: add required kernel configs (bnc#1012382).
- selftests/powerpc: Kill child processes on SIGINT (bnc#1012382).
- selftest: timers: Tweak raw_skew to SKIP when ADJ_OFFSET/other clock adjustments are in progress (bnc#1012382).
- selinux: use GFP_NOWAIT in the AVC kmem_caches (bnc#1012382).
- serial: cpm_uart: return immediately from console poll (bnc#1012382).
- serial: imx: restore handshaking irq for imx1 (bnc#1012382).
- signal: Properly deliver SIGSEGV from x86 uprobes (bsc#1110006).
- silence build warning in hyperv_init
- silence buildwarnings in hyperv/mmu.c
- slub: make ->cpu_partial unsigned int (bnc#1012382).
- smb2: fix missing files in root share directory listing (bnc#1012382).
- smb3: fill in statfs fsid and correct namelen (bsc#1112905).
- smb3: fix reset of bytes read and written stats (bnc#1012382).
- smb3: Number of requests sent should be displayed for SMB3 not just CIFS (bnc#1012382).
- sound: enable interrupt after dma buffer initialization (bnc#1012382).
- spi: rspi: Fix interrupted DMA transfers (bnc#1012382).
- spi: rspi: Fix invalid SPI use during system suspend (bnc#1012382).
- spi: sh-msiof: Fix handling of write value for SISTR register (bnc#1012382).
- spi: sh-msiof: Fix invalid SPI use during system suspend (bnc#1012382).
- spi: tegra20-slink: explicitly enable/disable clock (bnc#1012382).
- split-modules: use MAKE_ARGS
- srcu: Allow use of Tiny/Tree SRCU from both process and interrupt context (bsc#1050549).
- staging: android: ashmem: Fix mmap size validation (bnc#1012382).
- staging: android: ion: fix ION_IOC_{MAP,SHARE} use-after-free (bnc#1012382).
- staging: comedi: ni_mio_common: fix subdevice flags for PFI subdevice (bnc#1012382).
- staging: rt5208: Fix a sleep-in-atomic bug in xd_copy_page (bnc#1012382).
- staging: rts5208: fix missing error check on call to rtsx_write_register (bnc#1012382).
- staging/rts5208: Fix read overflow in memcpy (bnc#1012382).
- stmmac: fix valid numbers of unicast filter entries (bnc#1012382).
- stop_machine: Atomically queue and wake stopper threads (git-fixes).
- target: log Data-Out timeouts as errors (bsc#1095805).
- target: log NOP ping timeouts as errors (bsc#1095805).
- target: split out helper for cxn timeout error stashing (bsc#1095805).
- target: stash sess_err_stats on Data-Out timeout (bsc#1095805).
- target: use ISCSI_IQN_LEN in iscsi_target_stat (bsc#1095805).
- tcp: add tcp_ooo_try_coalesce() helper (bnc#1012382).
- tcp: call tcp_drop() from tcp_data_queue_ofo() (bnc#1012382).
- tcp: do not restart timewait timer on rst reception (bnc#1012382).
- tcp: fix a stale ooo_last_skb after a replace (bnc#1012382).
- tcp: free batches of packets in tcp_prune_ofo_queue() (bnc#1012382).
- tcp: increment sk_drops for dropped rx packets (bnc#1012382).
- tcp: use an RB tree for ooo receive queue (bnc#1012382).
- team: Forbid enslaving team device to itself (bnc#1012382).
- thermal: of-thermal: disable passive polling when thermal zone is disabled (bnc#1012382).
- tools: hv: fcopy: set 'error' in case an unknown operation was requested (bug#1109038).
- tools: hv: Fix a bug in the key delete code (bnc#1012382).
- tools: hv: fix compiler warnings about major/target_fname (bug#1109038).
- tools/hv: Fix IP reporting by KVP daemon with SRIOV (bug#1109038).
- tools: hv: fix snprintf warning in kvp_daemon (bug#1109038).
- tools: hv: ignore a NIC if it has been configured (bug#1109038).
- tools: hv: include string.h in hv_fcopy_daemon (bug#1109038).
- tools: hv: update buffer handling in hv_fcopy_daemon (bug#1109038).
- tools: hv: update lsvmbus to be compatible with python3 (bug#1109038).
- tools: hv: vss: fix loop device detection (bug#1109038).
- tools: hv: vss: Skip freezing filesystems backed by loop (bug#1109038).
- tools/vm/page-types.c: fix 'defined but not used' warning (bnc#1012382).
- tools/vm/slabinfo.c: fix sign-compare warning (bnc#1012382).
- tpm: Restore functionality to xen vtpm driver (bsc#1020645, git-fixes).
- tsl2550: fix lux1_input error in low light (bnc#1012382).
- tty: Drop tty->count on tty_reopen() failure (bnc#1105428).
- tty: rocket: Fix possible buffer overwrite on register_PCI (bnc#1012382).
- tty: vt_ioctl: fix potential Spectre v1 (bnc#1012382).
t usb: yurex: Fix buffer over-read in yurex_write() (bnc#1012382).
- ubifs: Check for name being NULL while mounting (bnc#1012382).
- ucma: fix a use-after-free in ucma_resolve_ip() (bnc#1012382).
- uio_hv_generic: add rescind support (bsc#1109038).
- uio_hv_generic: check that host supports monitor page (bsc#1109038).
- uio_hv_generic: create send and receive buffers (bsc#1109038).
- uio_hv_generic: fix configuration comments (bsc#1109038).
- uio_hv_generic: fix new type mismatch warnings (bsc#1109038).
- uio_hv_generic: fix type mismatch warnings (bsc#1109038).
- uio_hv_generic: use ISR callback method (bsc#1109038).
- uio_hv_generic: use standard mmap for resources (bsc#1109038).
- uio: potential double frees if __uio_register_device() fails (bnc#1012382).
- usb: add quirk for WORLDE Controller KS49 or Prodipe MIDI 49C USB controller (bnc#1012382).
- usb: Add quirk to support DJI CineSSD (bnc#1012382).
- usb: Avoid use-after-free by flushing endpoints early in usb_set_interface() (bnc#1012382).
- usb: cdc-wdm: Fix a sleep-in-atomic-context bug in service_outstanding_interrupt() (bnc#1012382).
- usb: Do not die twice if PCI xhci host is not responding in resume (bnc#1012382).
- usb: fix error handling in usb_driver_claim_interface() (bnc#1012382).
- usb: gadget: fotg210-udc: Fix memory leak of fotg210->ep[i] (bnc#1012382).
- usb: gadget: serial: fix oops when data rx'd after close (bnc#1012382).
- usb: handle NULL config in usb_find_alt_setting() (bnc#1012382).
- usb: host: u132-hcd: Fix a sleep-in-atomic-context bug in u132_get_frame() (bnc#1012382).
- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).
- usb: misc: uss720: Fix two sleep-in-atomic-context bugs (bnc#1012382).
- usb: net2280: Fix erroneous synchronization change (bnc#1012382).
- usb: remove LPM management from usb_driver_claim_interface() (bnc#1012382).
- usb: serial: io_ti: fix array underflow in completion handler (bnc#1012382).
- usb: serial: kobil_sct: fix modem-status error handling (bnc#1012382).
- usb: serial: simple: add Motorola Tetra MTP6550 id (bnc#1012382).
- usb: serial: ti_usb_3410_5052: fix array underflow in completion handler (bnc#1012382).
- usb: usbdevfs: restore warning for nonsensical flags (bnc#1012382).
- usb: usbdevfs: sanitize flags more (bnc#1012382).
- usb: wusbcore: security: cast sizeof to int for comparison (bnc#1012382).
- usb: yurex: Check for truncation in yurex_read() (bnc#1012382).
- use the new async probing feature for the hyperv drivers (bug#1109038).
- Use upstream version of pci-hyperv change 35a88a18d7
- uwb: hwa-rc: fix memory leak at probe (bnc#1012382).
- vfs: do not test owner for NFS in set_posix_acl() (bsc#1103405).
- video: goldfishfb: fix memory leak on driver remove (bnc#1012382).
- vmbus: add monitor_id and subchannel_id to sysfs per channel (bsc#1109038).
- vmbus: do not return values for uninitalized channels (bug#1109038).
- vmbus: make channel attributes static (bsc#1109038).
- vmbus: make hv_get_ringbuffer_availbytes local (bsc#1109038).
- vmci: type promotion bug in qp_host_get_user_memory() (bnc#1012382).
- vmw_balloon: include asm/io.h (bnc#1012382).
- vti6: remove !skb->ignore_df check from vti6_xmit() (bnc#1012382).
- watchdog: w83627hf: Added NCT6102D support (bsc#1106434).
- watchdog: w83627hf_wdt: Add quirk for Inves system (bsc#1106434).
- wlcore: Add missing PM call for wlcore_cmd_wait_for_event_or_timeout() (bnc#1012382).
- wlcore: Fix memory leak in wlcore_cmd_wait_for_event_or_timeout (git-fixes).
- x86/apic: Fix restoring boot IRQ mode in reboot and kexec/kdump (bsc#1110006).
- x86/apic: Split disable_IO_APIC() into two functions to fix CONFIG_KEXEC_JUMP=y (bsc#1110006).
- x86/apic: Split out restore_boot_irq_mode() from disable_IO_APIC() (bsc#1110006).
- x86/boot: Fix 'run_size' calculation (bsc#1110006).
- x86/cpufeature: deduplicate X86_FEATURE_L1TF_PTEINV (kabi).
- x86/entry/64: Add two more instruction suffixes (bnc#1012382).
- x86/entry/64: Clear registers for exceptions/interrupts, to reduce speculation attack surface (bsc#1105931).
- x86/entry/64: Remove %ebx handling from error_entry/exit (bnc#1102715).
- x86/entry/64: sanitize extra registers on syscall entry (bsc#1105931).
- x86/fpu: Finish excising 'eagerfpu' (bnc#1012382).
- x86/fpu: Remove second definition of fpu in __fpu__restore_sig() (bsc#1110006).
- x86/fpu: Remove struct fpu::counter (bnc#1012382).
- x86/fpu: Remove use_eager_fpu() (bnc#1012382).
- x86/headers/UAPI: Use __u64 instead of u64 in <uapi/asm/hyperv.h> (bug#1109038).
- x86/hyperv: Add a function to read both TSC and TSC page value simulateneously (bsc#1109038).
- x86/hyperv: Add interrupt handler annotations (bug#1109038).
- x86/hyper-v: allocate and use Virtual Processor Assist Pages (bug#1109038).
- x86/hyper-V: Allocate the IDT entry early in boot (bug#1109038).
- x86/hyper-v: Check cpumask_to_vpset() return value in hyperv_flush_tlb_others_ex() (bug#1109038).
- x86/hyperv: Check for required priviliges in hyperv_init() (bsc#1109038).
- x86/hyper-v: Check for VP_INVAL in hyperv_flush_tlb_others() (bug#1109038).
- x86/hyperv: Clear vCPU banks between calls to avoid flushing unneeded vCPUs (bsc#1109038).
- x86/Hyper-V: Consolidate the allocation of the hypercall input page (bug#1109038).
- x86/hyper-v: define struct hv_enlightened_vmcs and clean field bits (bug#1109038).
- x86/hyper-v: detect nested features (bug#1109038).
- x86/hyperv: Do not use percpu areas for pcpu_flush/pcpu_flush_ex structures (bsc#1109038).
- x86/Hyper-V: Enable IPI enlightenments (bug#1109038).
- x86/Hyper-V: Enhanced IPI enlightenment (bug#1109038).
- x86/Hyper-V: Enlighten APIC access (bug#1109038).
- x86/hyperv: Fix hypercalls with extended CPU ranges for TLB flushing (bsc#1109038).
- x86/hyper-v: Fix the circular dependency in IPI enlightenment (bug#1109038).
- x86/hyper-v: Fix wrong merge conflict resolution (bug#1109038).
- x86/Hyper-V/hv_apic: Build the Hyper-V APIC conditionally (bug#1109038).
- x86/Hyper-V/hv_apic: Include asm/apic.h (bug#1109038).
- x86/hyper-v: Implement hv_do_fast_hypercall16 (bug#1109038).
- x86/hyper-v: Implement rep hypercalls (bug#1109038).
- x86/hyper-v: move definitions from TLFS to hyperv-tlfs.h (bug#1109038).
- x86/hyper-v: move hyperv.h out of uapi (bug#1109038).
- x86/hyper-v: move struct hv_flush_pcpu{,ex} definitions to common header (bug#1109038).
- x86/hyperv: Read TSC frequency from a synthetic MSR (bug#1109038).
- x86/hyperv: Redirect reenlightment notifications on CPU offlining (bug#1109038).
- x86/hyperv: Reenlightenment notifications support (bug#1109038).
- x86/hyper-v: Remove duplicated HV_X64_EX_PROCESSOR_MASKS_RECOMMENDED definition (bug#1109038).
- x86/hyper-v: rename ipi_arg_{ex,non_ex} structures (bug#1109038).
- x86/hyper-v: stash the max number of virtual/logical processor (bug#1109038).
- x86/hyperv: Stop suppressing X86_FEATURE_PCID (bsc#1109038).
- x86/hyper-v: Support extended CPU ranges for TLB flush hypercalls (bug#1109038).
- x86/hyper-v: Use cheaper HVCALL_FLUSH_VIRTUAL_ADDRESS_{LIST,SPACE} hypercalls when possible (bug#1109038).
- x86/hyper-v: Use cheaper HVCALL_SEND_IPI hypercall when possible (bug#1109038).
- x86/hyper-v: Use 'fast' hypercall for HVCALL_SEND_IPI (bug#1109038).
- x86/hyper-v: Use hypercall for remote TLB flush (bug#1109038).
- x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772).
- x86/kaiser: Avoid loosing NMIs when using trampoline stack (bsc#1106293 bsc#1099597).
- x86/kexec: Correct KEXEC_BACKUP_SRC_END off-by-one error (bsc#1114648).
- x86/kvm: rename HV_X64_MSR_APIC_ASSIST_PAGE to HV_X64_MSR_VP_ASSIST_PAGE (bug#1109038).
- x86/mm: Remove in_nmi() warning from vmalloc_fault() (bnc#1012382).
- x86: msr-index.h: Correct SNB_C1/C3_AUTO_UNDEMOTE defines (bsc#1110006).
- x86/numa_emulation: Fix emulated-to-physical node mapping (bnc#1012382).
- x86/pae: use 64 bit atomic xchg function in native_ptep_get_and_clear (bnc#1012382).
- x86/paravirt: Fix some warning messages (bnc#1065600).
- x86/percpu: Fix this_cpu_read() (bsc#1110006).
- x86,sched: Allow topologies where NUMA nodes share an LLC (bsc#1091158, bsc#1101555).
- x86/spec_ctrl: Fix spec_ctrl reporting (bsc#1106913, bsc#1111516).
- x86/speculation: Apply IBPB more strictly to avoid cross-process data leak (bsc#1106913).
- x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation (bsc#1106913).
- x86/speculation/l1tf: Fix up pte->pfn conversion for PAE (bnc#1012382).
- x86/speculation: Propagate information about RSB filling mitigation to sysfs (bsc#1106913).
- x86/time: Correct the attribute on jiffies' definition (bsc#1110006).
- x86/tsc: Add missing header to tsc_msr.c (bnc#1012382).
- x86/vdso: Fix asm constraints on vDSO syscall fallbacks (bsc#1110006).
- x86/vdso: Fix vDSO build if a retpoline is emitted (bsc#1110006).
- x86/vdso: Fix vDSO syscall fallback asm constraint regression (bsc#1110006).
- x86/vdso: Only enable vDSO retpolines when enabled and supported (bsc#1110006).
- xen: avoid crash in disable_hotplug_cpu (bnc#1012382 bsc#1106594 bsc#1042422).
- xen/blkfront: correct purging of persistent grants (bnc#1065600).
- xen: fix GCC warning and remove duplicate EVTCHN_ROW/EVTCHN_COL usage (bnc#1012382).
- xen: issue warning message when out of grant maptrack entries (bsc#1105795).
- xen/manage: do not complain about an empty value in control/sysrq node (bnc#1012382).
- xen/netfront: do not bug in case of too many frags (bnc#1012382).
- xen-netfront: fix queue name setting (bnc#1012382).
- xen/netfront: fix waiting for xenbus state change (bnc#1012382).
- xen-netfront: fix warn message as irq device name has '/' (bnc#1012382).
- xen/x86/vpmu: Zero struct pt_regs before calling into sample handling code (bnc#1012382).
- xfrm: fix 'passing zero to ERR_PTR()' warning (bnc#1012382).
- xfs: add a new xfs_iext_lookup_extent_before helper (bsc#1095344).
- xfs: add asserts for the mmap lock in xfs_{insert,collapse}_file_space (bsc#1095344).
- xfs: add a xfs_bmap_fork_to_state helper (bsc#1095344).
- xfs: add a xfs_iext_update_extent helper (bsc#1095344).
- xfs: add comments documenting the rebalance algorithm (bsc#1095344).
- xfs: add some comments to xfs_iext_insert/xfs_iext_insert_node (bsc#1095344).
- xfs: add xfs_trim_extent (bsc#1095344).
- xfs: allow unaligned extent records in xfs_bmbt_disk_set_all (bsc#1095344).
- xfs: borrow indirect blocks from freed extent when available (bsc#1095344).
- xfs: cleanup xfs_bmap_last_before (bsc#1095344).
- xfs: do not create overlapping extents in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: do not rely on extent indices in xfs_bmap_collapse_extents (bsc#1095344).
- xfs: do not rely on extent indices in xfs_bmap_insert_extents (bsc#1095344).
- xfs: do not set XFS_BTCUR_BPRV_WASDEL in xfs_bunmapi (bsc#1095344).
- xfs: during btree split, save new block key & ptr for future insertion (bsc#1095344).
- xfs: factor out a helper to initialize a local format inode fork (bsc#1095344).
- xfs: fix memory leak in xfs_iext_free_last_leaf (bsc#1095344).
- xfs: fix number of records handling in xfs_iext_split_leaf (bsc#1095344).
- xfs: fix transaction allocation deadlock in IO path (bsc#1090535).
- xfs: handle indlen shortage on delalloc extent merge (bsc#1095344).
- xfs: handle zero entries case in xfs_iext_rebalance_leaf (bsc#1095344).
- xfs: improve kmem_realloc (bsc#1095344).
- xfs: inline xfs_shift_file_space into callers (bsc#1095344).
- xfs: introduce the xfs_iext_cursor abstraction (bsc#1095344).
- xfs: iterate over extents in xfs_bmap_extents_to_btree (bsc#1095344).
- xfs: iterate over extents in xfs_iextents_copy (bsc#1095344).
- xfs: make better use of the 'state' variable in xfs_bmap_del_extent_real (bsc#1095344).
- xfs: merge xfs_bmap_read_extents into xfs_iread_extents (bsc#1095344).
- xfs: move pre/post-bmap tracing into xfs_iext_update_extent (bsc#1095344).
- xfs: move some code around inside xfs_bmap_shift_extents (bsc#1095344).
- xfs: move some more code into xfs_bmap_del_extent_real (bsc#1095344).
- xfs: move xfs_bmbt_irec and xfs_exntst_t to xfs_types.h (bsc#1095344).
- xfs: move xfs_iext_insert tracepoint to report useful information (bsc#1095344).
- xfs: new inode extent list lookup helpers (bsc#1095344).
- xfs: only run torn log write detection on dirty logs (bsc#1095753).
- xfs: pass an on-disk extent to xfs_bmbt_validate_extent (bsc#1095344).
- xfs: pass a struct xfs_bmbt_irec to xfs_bmbt_lookup_eq (bsc#1095344).
- xfs: pass a struct xfs_bmbt_irec to xfs_bmbt_update (bsc#1095344).
- xfs: pass struct xfs_bmbt_irec to xfs_bmbt_validate_extent (bsc#1095344).
- xfs: provide helper for counting extents from if_bytes (bsc#1095344).
- xfs: refactor delalloc accounting in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: refactor delalloc indlen reservation split into helper (bsc#1095344).
- xfs: refactor dir2 leaf readahead shadow buffer cleverness (bsc#1095344).
- xfs: refactor in-core log state update to helper (bsc#1095753).
- xfs: refactor unmount record detection into helper (bsc#1095753).
- xfs: refactor xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_hole_delay (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_hole_real (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_unwritten_real (bsc#1095344).
- xfs: refactor xfs_bunmapi_cow (bsc#1095344).
- xfs: refactor xfs_del_extent_real (bsc#1095344).
- xfs: remove a duplicate assignment in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: remove all xfs_bmbt_set_* helpers except for xfs_bmbt_set_all (bsc#1095344).
- xfs: remove a superflous assignment in xfs_iext_remove_node (bsc#1095344).
- xfs: remove if_rdev (bsc#1095344).
- xfs: remove prev argument to xfs_bmapi_reserve_delalloc (bsc#1095344).
- xfs: remove support for inlining data/extents into the inode fork (bsc#1095344).
- xfs: remove the never fully implemented UUID fork format (bsc#1095344).
- xfs: remove the nr_extents argument to xfs_iext_insert (bsc#1095344).
- xfs: remove the nr_extents argument to xfs_iext_remove (bsc#1095344).
- xfs: remove XFS_BMAP_MAX_SHIFT_EXTENTS (bsc#1095344).
- xfs: remove XFS_BMAP_TRACE_EXLIST (bsc#1095344).
- xfs: remove xfs_bmbt_get_state (bsc#1095344).
- xfs: remove xfs_bmse_shift_one (bsc#1095344).
- xfs: rename bno to end in __xfs_bunmapi (bsc#1095344).
- xfs: replace xfs_bmbt_lookup_ge with xfs_bmbt_lookup_first (bsc#1095344).
- xfs: replace xfs_qm_get_rtblks with a direct call to xfs_bmap_count_leaves (bsc#1095344).
- xfs: rewrite getbmap using the xfs_iext_* helpers (bsc#1095344).
- xfs: rewrite xfs_bmap_count_leaves using xfs_iext_get_extent (bsc#1095344).
- xfs: rewrite xfs_bmap_first_unused to make better use of xfs_iext_get_extent (bsc#1095344).
- xfs: separate log head record discovery from verification (bsc#1095753).
- xfs: simplify the xfs_getbmap interface (bsc#1095344).
- xfs: simplify validation of the unwritten extent bit (bsc#1095344).
- xfs: split indlen reservations fairly when under reserved (bsc#1095344).
- xfs: split xfs_bmap_shift_extents (bsc#1095344).
- xfs: switch xfs_bmap_local_to_extents to use xfs_iext_insert (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_hole_delay (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_hole_real (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_unwritten_real (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_collapse_extents (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_del_extent_* (bsc#1095344).
- xfs: update freeblocks counter after extent deletion (bsc#1095344).
- xfs: update got in xfs_bmap_shift_update_extent (bsc#1095344).
- xfs: use a b+tree for the in-core extent list (bsc#1095344).
- xfs: use correct state defines in xfs_bmap_del_extent_{cow,delay} (bsc#1095344).
- xfs: use new extent lookup helpers in xfs_bmapi_read (bsc#1095344).
- xfs: use new extent lookup helpers in xfs_bmapi_write (bsc#1095344).
- xfs: use new extent lookup helpers in __xfs_bunmapi (bsc#1095344).
- xfs: use the state defines in xfs_bmap_del_extent_real (bsc#1095344).
- xfs: use xfs_bmap_del_extent_delay for the data fork as well (bsc#1095344).
- xfs: use xfs_iext_*_extent helpers in xfs_bmap_shift_extents (bsc#1095344).
- xfs: use xfs_iext_*_extent helpers in xfs_bmap_split_extent_at (bsc#1095344).
- xfs: use xfs_iext_get_extent instead of open coding it (bsc#1095344).
- xfs: use xfs_iext_get_extent in xfs_bmap_first_unused (bsc#1095344).
- xhci: Add missing CAS workaround for Intel Sunrise Point xHCI (bnc#1012382).
- xhci: Do not print a warning when setting link state for disabled ports (bnc#1012382).
Patchnames
SUSE-2019-95,SUSE-SLE-SERVER-12-SP3-2019-95
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\n\nThe SUSE Linux Enterprise 12 SP3 Azure kernel was updated to 4.4.162 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).\n- CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).\n- CVE-2018-18690: A local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE operations with conversion of an attr from short to long form (bnc#1105025).\n- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).\n- CVE-2018-9516: In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. (bnc#1108498).\n- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bnc#1107829).\n- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bnc#1108399).\n- CVE-2018-16597: Incorrect access checking in overlayfs mounts could be used by local attackers to modify or truncate files in the underlying filesystem (bnc#1106512).\n- CVE-2018-14613: There is an invalid pointer dereference in io_ctl_map_page() when mounting and operating a crafted btrfs image, because of a lack of block group item validation in check_leaf_item in fs/btrfs/tree-checker.c (bnc#1102896).\n- CVE-2018-14617: There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory (bnc#1102870).\n- CVE-2018-16276: Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges (bnc#1106095 bnc#1115593).\n- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1087209).\n- CVE-2018-7480: The blkcg_init_queue function in block/blk-cgroup.c allowed local users to cause a denial of service (double free) or possibly have unspecified other impact by triggering a creation failure (bnc#1082863).\n\nThe following non-security bugs were fixed:\n\n- 6lowpan: iphc: reset mac_header after decompress to fix panic (bnc#1012382).\n- alsa: bebob: use address returned by kmalloc() instead of kernel stack for streaming DMA mapping (bnc#1012382).\n- alsa: emu10k1: fix possible info leak to userspace on SNDRV_EMU10K1_IOCTL_INFO (bnc#1012382).\n- alsa: hda: Add AZX_DCAPS_PM_RUNTIME for AMD Raven Ridge (bnc#1012382).\n- alsa: hda - Fix cancel_work_sync() stall from jackpoll work (bnc#1012382).\n- alsa: hda/realtek - Cannot adjust speaker's volume on Dell XPS 27 7760 (bnc#1012382).\n- alsa: msnd: Fix the default sample sizes (bnc#1012382).\n- alsa: pcm: Fix snd_interval_refine first/last with open min/max (bnc#1012382).\n- alsa: usb-audio: Fix multiple definitions in AU0828_DEVICE() macro (bnc#1012382).\n- apparmor: remove no-op permission check in policy_unpack (git-fixes).\n- arc: build: Get rid of toolchain check (bnc#1012382).\n- arc: clone syscall to setp r25 as thread pointer (bnc#1012382).\n- arch/hexagon: fix kernel/dma.c build warning (bnc#1012382).\n- arch-symbols: use bash as interpreter since the script uses bashism.\n- arc: [plat-axs*]: Enable SWAP (bnc#1012382).\n- arm64: bpf: jit JMP_JSET_{X,K} (bsc#1110613).\n- arm64: Correct type for PUD macros (bsc#1110600).\n- arm64: cpufeature: Track 32bit EL0 support (bnc#1012382).\n- arm64: dts: qcom: db410c: Fix Bluetooth LED trigger (bnc#1012382).\n- arm64: fix erroneous __raw_read_system_reg() cases (bsc#1110606).\n- arm64: Fix potential race with hardware DBM in ptep_set_access_flags() (bsc#1110605).\n- arm64: fpsimd: Avoid FPSIMD context leakage for the init task (bsc#1110603).\n- arm64: jump_label.h: use asm_volatile_goto macro instead of 'asm goto' (bnc#1012382).\n- arm64: kasan: avoid bad virt_to_pfn() (bsc#1110612).\n- arm64: kasan: avoid pfn_to_nid() before page array is initialized (bsc#1110619).\n- arm64/kasan: do not allocate extra shadow memory (bsc#1110611).\n- arm64: kernel: Update kerneldoc for cpu_suspend() rename (bsc#1110602).\n- arm64: kgdb: handle read-only text / modules (bsc#1110604).\n- arm64: KVM: Sanitize PSTATE.M when being set from userspace (bnc#1012382).\n- arm64: KVM: Tighten guest core register access from userspace (bnc#1012382).\n- arm64/mm/kasan: do not use vmemmap_populate() to initialize shadow (bsc#1110618).\n- arm64: ptrace: Avoid setting compat FP[SC]R to garbage if get_user fails (bsc#1110601).\n- arm64: supported.conf: mark armmmci as not supported\n- arm64 Update config files. (bsc#1110468) Set MMC_QCOM_DML to build-in and delete driver from supported.conf\n- arm64: vdso: fix clock_getres for 4GiB-aligned res (bsc#1110614).\n- arm: dts: at91: add new compatibility string for macb on sama5d3 (bnc#1012382).\n- arm: dts: dra7: fix DCAN node addresses (bnc#1012382).\n- arm: exynos: Clear global variable on init error path (bnc#1012382).\n- arm: hisi: check of_iomap and fix missing of_node_put (bnc#1012382).\n- arm: hisi: fix error handling and missing of_node_put (bnc#1012382).\n- arm: hisi: handle of_iomap and fix missing of_node_put (bnc#1012382).\n- arm: mvebu: declare asm symbols as character arrays in pmsu.c (bnc#1012382).\n- asm/sections: add helpers to check for section data (bsc#1063026).\n- ASoC: cs4265: fix MMTLR Data switch control (bnc#1012382).\n- ASoC: dapm: Fix potential DAI widget pointer deref when linking DAIs (bnc#1012382).\n- ASoC: sigmadsp: safeload should not have lower byte limit (bnc#1012382).\n- ASoC: wm8804: Add ACPI support (bnc#1012382).\n- ASoC: wm8994: Fix missing break in switch (bnc#1012382).\n- ata: libahci: Correct setting of DEVSLP register (bnc#1012382).\n- ath10k: disable bundle mgmt tx completion event support (bnc#1012382).\n- ath10k: fix scan crash due to incorrect length calculation (bnc#1012382).\n- ath10k: fix use-after-free in ath10k_wmi_cmd_send_nowait (bnc#1012382).\n- ath10k: prevent active scans on potential unusable channels (bnc#1012382).\n- ath10k: protect ath10k_htt_rx_ring_free with rx_ring.lock (bnc#1012382).\n- audit: fix use-after-free in audit_add_watch (bnc#1012382).\n- autofs: fix autofs_sbi() does not check super block type (bnc#1012382).\n- binfmt_elf: Respect error return from `regset->active' (bnc#1012382).\n- block: bvec_nr_vecs() returns value for wrong slab (bsc#1082979).\n- bluetooth: Add a new Realtek 8723DE ID 0bda:b009 (bnc#1012382).\n- bluetooth: h5: Fix missing dependency on BT_HCIUART_SERDEV (bnc#1012382).\n- bluetooth: hidp: Fix handling of strncpy for hid->name information (bnc#1012382).\n- bnxt_en: Fix TX timeout during netpoll (bnc#1012382).\n- bonding: avoid possible dead-lock (bnc#1012382).\n- bpf: fix cb access in socket filter programs on tail calls (bsc#1012382).\n- bpf: fix map not being uncharged during map creation failure (bsc#1012382).\n- bpf: fix overflow in prog accounting (bsc#1012382).\n- bpf, s390: fix potential memleak when later bpf_jit_prog fails (git-fixes).\n- bpf, s390x: do not reload skb pointers in non-skb context (git-fixes).\n- btrfs: add a comp_refs() helper (dependency for bsc#1031392).\n- btrfs: Add checker for EXTENT_CSUM (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: add missing initialization in btrfs_check_shared (Git-fixes bsc#1112262).\n- btrfs: Add sanity check for EXTENT_DATA when reading out leaf (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: add tracepoints for outstanding extents mods (dependency for bsc#1031392).\n- btrfs: add wrapper for counting BTRFS_MAX_EXTENT_SIZE (dependency for bsc#1031392).\n- btrfs: Check if item pointer overlaps with the item itself (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: Check that each block group has corresponding chunk at mount time (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: cleanup extent locking sequence (dependency for bsc#1031392).\n- btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag (Follow up fixes for bsc#1031392).\n- btrfs: delayed-inode: Remove wrong qgroup meta reservation calls (bsc#1031392).\n- btrfs: delayed-inode: Use new qgroup meta rsv for delayed inode and item (bsc#1031392).\n- btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667).\n- btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).\n- btrfs: fix error handling in btrfs_dev_replace_start (bsc#1107535).\n- btrfs: fix invalid attempt to free reserved space on failure to cow range (dependency for bsc#1031392).\n- btrfs: fix missing error return in btrfs_drop_snapshot (Git-fixes bsc#1109919).\n- btrfs: Fix race condition between delayed refs and blockgroup removal (Git-fixes bsc#1112263).\n- btrfs: Fix wrong btrfs_delalloc_release_extents parameter (bsc#1031392).\n- btrfs: Introduce mount time chunk <-> dev extent mapping check (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: kill trans in run_delalloc_nocow and btrfs_cross_ref_exist (dependency for bsc#1031392).\n- btrfs: make the delalloc block rsv per inode (dependency for bsc#1031392).\n- btrfs: Move leaf and node validation checker to tree-checker.c (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: pass delayed_refs directly to btrfs_find_delayed_ref_head (dependency for bsc#1031392).\n- btrfs: qgroup: Add quick exit for non-fs extents (dependency for bsc#1031392).\n- btrfs: qgroup: Cleanup btrfs_qgroup_prepare_account_extents function (dependency for bsc#1031392).\n- btrfs: qgroup: Cleanup the remaining old reservation counters (bsc#1031392).\n- btrfs: qgroup: Commit transaction in advance to reduce early EDQUOT (bsc#1031392).\n- btrfs: qgroup: Do not use root->qgroup_meta_rsv for qgroup (bsc#1031392).\n- btrfs: qgroup: Fix wrong qgroup reservation update for relationship modification (bsc#1031392).\n- btrfs: qgroup: Introduce function to convert META_PREALLOC into META_PERTRANS (bsc#1031392).\n- btrfs: qgroup: Introduce helpers to update and access new qgroup rsv (bsc#1031392).\n- btrfs: qgroup: Make qgroup_reserve and its callers to use separate reservation type (bsc#1031392).\n- btrfs: qgroup: Skeleton to support separate qgroup reservation type (bsc#1031392).\n- btrfs: qgroups: opencode qgroup_free helper (dependency for bsc#1031392).\n- btrfs: qgroup: Split meta rsv type into meta_prealloc and meta_pertrans (bsc#1031392).\n- btrfs: qgroup: Update trace events for metadata reservation (bsc#1031392).\n- btrfs: qgroup: Update trace events to use new separate rsv types (bsc#1031392).\n- btrfs: qgroup: Use independent and accurate per inode qgroup rsv (bsc#1031392).\n- btrfs: qgroup: Use root::qgroup_meta_rsv_* to record qgroup meta reserved space (bsc#1031392).\n- btrfs: qgroup: Use separate meta reservation type for delalloc (bsc#1031392).\n- btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized (bnc#1012382).\n- btrfs: remove type argument from comp_tree_refs (dependency for bsc#1031392).\n- btrfs: replace: Reset on-disk dev stats value after replace (bnc#1012382).\n- btrfs: rework outstanding_extents (dependency for bsc#1031392).\n- btrfs: scrub: Do not use inode page cache in scrub_handle_errored_block() (bsc#1108096).\n- btrfs: switch args for comp_*_refs (dependency for bsc#1031392).\n- btrfs: Take trans lock before access running trans in check_delayed_ref (Follow up fixes for bsc#1031392).\n- btrfs: tree-checker: Add checker for dir item (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: tree-checker: Detect invalid and empty essential trees (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: tree-checker: Enhance btrfs_check_node output (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: tree-checker: Enhance output for btrfs_check_leaf (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: tree-checker: Enhance output for check_csum_item (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: tree-checker: Enhance output for check_extent_data_item (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: tree-checker: Fix false panic for sanity test (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: tree-checker: Replace root parameter with fs_info (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: tree-checker: use %zu format string for size_t (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: tree-checker: use %zu format string for size_t (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: tree-checker: Verify block_group_item (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: use correct compare function of dirty_metadata_bytes (bnc#1012382).\n- btrfs: Verify that every chunk has corresponding block group at mount time (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- ceph: avoid a use-after-free in ceph_destroy_options() (bsc#1112007).\n- cfg80211: fix a type issue in ieee80211_chandef_to_operating_class() (bnc#1012382).\n- cfg80211: nl80211_update_ft_ies() to validate NL80211_ATTR_IE (bnc#1012382).\n- cfq: Give a chance for arming slice idle timer in case of group_idle (bnc#1012382).\n- cgroup: Fix deadlock in cpu hotplug path (bnc#1012382).\n- cgroup, netclassid: add a preemption point to write_classid (bnc#1098996).\n- cifs: check for STATUS_USER_SESSION_DELETED (bsc#1112902).\n- cifs: check if SMB2 PDU size has been padded and suppress the warning (bnc#1012382).\n- cifs: connect to servername instead of IP for IPC$ share (bsc#1106359).\n- cifs: fix memory leak in SMB2_open() (bsc#1112894).\n- cifs: Fix use after free of a mid_q_entry (bsc#1112903).\n- cifs: fix wrapping bugs in num_entries() (bnc#1012382).\n- cifs: integer overflow in in SMB2_ioctl() (bsc#1012382).\n- cifs: prevent integer overflow in nxt_dir_entry() (bnc#1012382).\n- cifs: read overflow in is_valid_oplock_break() (bnc#1012382).\n- clk: imx6ul: fix missing of_node_put() (bnc#1012382).\n- clocksource/drivers/ti-32k: Add CLOCK_SOURCE_SUSPEND_NONSTOP flag for non-am43 SoCs (bnc#1012382).\n- coresight: Handle errors in finding input/output ports (bnc#1012382).\n- coresight: tpiu: Fix disabling timeouts (bnc#1012382).\n- cpu/hotplug: Fix SMT supported evaluation (bsc#1089343).\n- crypto: clarify licensing of OpenSSL asm code ().\n- crypto: mxs-dcp - Fix wait logic on chan threads (bnc#1012382).\n- crypto: sharah - Unregister correct algorithms for SAHARA 3 (bnc#1012382).\n- crypto: skcipher - Fix -Wstringop-truncation warnings (bnc#1012382).\n- crypto: vmx - Remove overly verbose printk from AES XTS init (git-fixes).\n- debugobjects: Make stack check warning more informative (bnc#1012382).\n- Define dependencies of in-kernel KMPs statically This allows us to use rpm's internal dependency generator (bsc#981083).\n- Define early_radix_enabled() (bsc#1094244).\n- dmaengine: pl330: fix irq race with terminate_all (bnc#1012382).\n- dm cache: fix resize crash if user does not reload cache table (bnc#1012382).\n- dm kcopyd: avoid softlockup in run_complete_job (bnc#1012382).\n- dm-mpath: do not try to access NULL rq (bsc#1110337).\n- dm-mpath: finally fixup cmd_flags (bsc#1110930).\n- dm thin metadata: fix __udivdi3 undefined on 32-bit (bnc#1012382).\n- dm thin metadata: try to avoid ever aborting transactions (bnc#1012382).\n- Do not ship firmware (bsc#1054239). Pull firmware from kernel-firmware instead.\n- drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bug#1109038).\n- drivers: hv: vmbus: Add comments on ring buffer signaling (bug#1109038).\n- drivers: hv: vmbus: add numa_node to sysfs (bug#1109038).\n- drivers: hv: vmbus: Cleanup synic memory free path (bug#1109038).\n- drivers: hv: vmbus: do not mark HV_PCIE as perf_device (bug#1109038).\n- drivers: hv: vmbus: enable VMBus protocol version 5.0 (bug#1109038).\n- drivers: hv: vmbus: Expose per-channel interrupts and events counters (bsc#1109038).\n- drivers: hv: vmbus: Fix a rescind issue (bsc#1109038).\n- drivers: hv: vmbus: Fix bugs in rescind handling (bug#1109038).\n- drivers: hv: vmbus: Fix ring buffer signaling (bug#1109038).\n- drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bug#1109038).\n- drivers: hv: vmbus: Fix the offer_in_progress in vmbus_process_offer() (bug#1109038).\n- drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bug#1109038).\n- drivers: hv: vmbus: Make panic reporting to be more useful (bsc#1109038).\n- drivers: hv: vmbus: Make TLFS #define names architecture neutral (bug#1109038).\n- drivers: hv: vmbus: Removed an unnecessary cast from void * (bug#1109038).\n- drivers: hv: vmbus: Remove use of slow_virt_to_phys() (bug#1109038).\n- drivers: hv: vmbus: Remove x86-isms from arch independent drivers (bsc#1109038).\n- drivers: hv: vmbus: Remove x86 MSR refs in arch independent code (bug#1109038).\n- drivers: hv: vmbus: Reset the channel callback in vmbus_onoffer_rescind() (bug#1109038).\n- drivers: hv: vmbus: respect what we get from hv_get_synint_state() (bug#1109038).\n- drivers: hv: vmbus: Use get/put_cpu() in vmbus_connect() (bug#1109038).\n- drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bug#1109038).\n- drivers: net: cpsw: fix parsing of phy-handle DT property in dual_emac config (bnc#1012382).\n- drivers: net: cpsw: fix segfault in case of bad phy-handle (bnc#1012382).\n- drivers/tty: add error handling for pcmcia_loop_config (bnc#1012382).\n- drm/amdgpu: Fix SDMA HQD destroy error on gfx_v7 (bnc#1012382).\n- drm/amdkfd: Fix error codes in kfd_get_process (bnc#1012382).\n- drm/hisilicon: hibmc: Do not carry error code in HiBMC framebuffer (bsc#1113766)\n- drm/hisilicon: hibmc: Do not overwrite fb helper surface depth (bsc#1113766)\n- drm/nouveau/drm/nouveau: Use pm_runtime_get_noresume() in connector_detect() (bnc#1012382).\n- drm/nouveau/TBDdevinit: do not fail when PMU/PRE_OS is missing from VBIOS (bnc#1012382).\n- drm/nouveau: tegra: Detach from ARM DMA/IOMMU mapping (bnc#1012382).\n- drm/virtio: fix bounds check in virtio_gpu_cmd_get_capset() (bsc#1106929)\n- Drop dtb-source.spec and move the sources to kernel-source (bsc#1011920)\n- e1000: check on netif_running() before calling e1000_up() (bnc#1012382).\n- e1000: ensure to free old tx/rx rings in set_ringparam() (bnc#1012382).\n- ebtables: arpreply: Add the standard target sanity check (bnc#1012382).\n- edac: Fix memleak in module init error path (bsc#1109441).\n- edac, i7core: Fix memleaks and use-after-free on probe and remove (1109441).\n- edac, thunderx: Fix memory leak in thunderx_l2c_threaded_isr() (bsc#1114648).\n- ethernet: ti: davinci_emac: add missing of_node_put after calling of_parse_phandle (bnc#1012382).\n- ethtool: Remove trailing semicolon for static inline (bnc#1012382).\n- ethtool: restore erroneously removed break in dev_ethtool (bsc#1114229).\n- ext4: avoid divide by zero fault when deleting corrupted inline directories (bnc#1012382).\n- ext4: do not mark mmp buffer head dirty (bnc#1012382).\n- ext4: fix online resize's handling of a too-small final block group (bnc#1012382).\n- ext4: fix online resizing for bigalloc file systems with a 1k block size (bnc#1012382).\n- ext4: recalucate superblock checksum after updating free blocks/inodes (bnc#1012382).\n- f2fs: do not set free of current section (bnc#1012382).\n- f2fs: fix to do sanity check with {sit,nat}_ver_bitmap_bytesize (bnc#1012382).\n- fat: validate ->i_start before using (bnc#1012382).\n- fbdev: Distinguish between interlaced and progressive modes (bnc#1012382).\n- fbdev: fix broken menu dependencies (bsc#1106929)\n- fbdev/omapfb: fix omapfb_memory_read infoleak (bnc#1012382).\n- fbdev/via: fix defined but not used warning (bnc#1012382).\n- Fixes: Commit cdbf92675fad ('mm: numa: avoid waiting on freed migrated pages') (bnc#1012382).\n- fix init of hv_vp_index on SMP\n- floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl (bnc#1012382).\n- fork: do not copy inconsistent signal handler state to child (bnc#1012382).\n- fs/cifs: do not translate SFM_SLASH (U+F026) to backslash (bnc#1012382).\n- fs/cifs: suppress a string overflow warning (bnc#1012382).\n- fs/dcache.c: fix kmemcheck splat at take_dentry_name_snapshot() (bnc#1012382).\n- fs/eventpoll: loosen irq-safety when possible (bsc#1096052).\n- genirq: Delay incrementing interrupt count if it's disabled/pending (bnc#1012382).\n- gfs2: Special-case rindex for gfs2_grow (bnc#1012382).\n- gpio: adp5588: Fix sleep-in-atomic-context bug (bnc#1012382).\n- gpiolib: Mark gpio_suffixes array with __maybe_unused (bnc#1012382).\n- gpio: ml-ioh: Fix buffer underwrite on probe error path (bnc#1012382).\n- gpio: tegra: Move driver registration to subsys_init level (bnc#1012382).\n- gso_segment: Reset skb->mac_len after modifying network header (bnc#1012382).\n- hexagon: modify ffs() and fls() to return int (bnc#1012382).\n- hfsplus: do not return 0 when fill_super() failed (bnc#1012382).\n- hfs: prevent crash on exit from failed search (bnc#1012382).\n- hid: hid-ntrig: add error handling for sysfs_create_group (bnc#1012382).\n- hid: hyperv: pr_err() strings should end with newlines (bug#1109038).\n- hid: sony: Support DS4 dongle (bnc#1012382).\n- hid: sony: Update device ids (bnc#1012382).\n- hv: add SPDX license id to Kconfig (bug#1109038).\n- hv: add SPDX license to trace (bug#1109038).\n- hv: avoid crash in vmbus sysfs files (bnc#1108377).\n- hv_balloon: trace post_status (bug#1109038).\n- hv_netvsc: Add handlers for ethtool get/set msg level (bug#1109038).\n- hv_netvsc: Add NetVSP v6 and v6.1 into version negotiation (bug#1109038).\n- hv_netvsc: Add per-cpu ethtool stats for netvsc (bug#1109038).\n- hv_netvsc: Add range checking for rx packet offset and length (bug#1109038).\n- hv_netvsc: add trace points (bug#1109038).\n- hv_netvsc: avoid retry on send during shutdown (bug#1109038).\n- hv_netvsc: avoid unnecessary wakeups on subchannel creation (bug#1109038).\n- hv_netvsc: cancel subchannel setup before halting device (bug#1109038).\n- hv_netvsc: change GPAD teardown order on older versions (bug#1109038).\n- hv_netvsc: Clean up extra parameter from rndis_filter_receive_data() (bug#1109038).\n- hv_netvsc: common detach logic (bug#1109038).\n- hv_netvsc: disable NAPI before channel close (bug#1109038).\n- hv_netvsc: Ensure correct teardown message sequence order (bug#1109038).\n- hv_netvsc: Fix a deadlock by getting rtnl lock earlier in netvsc_probe() (bug#1109038).\n- hv_netvsc: Fix a network regression after ifdown/ifup (bug#1109038).\n- hv_netvsc: fix bogus ifalias on network device (bug#1109038).\n- hv_netvsc: fix deadlock on hotplug (bug#1109038).\n- hv_netvsc: fix error unwind handling if vmbus_open fails (bug#1109038).\n- hv/netvsc: fix handling of fallback to single queue mode (bug#1109038).\n- hv_netvsc: Fix napi reschedule while receive completion is busy (bug#1109038).\n- hv_netvsc: Fix net device attach on older Windows hosts (bug#1109038).\n- hv_netvsc: fix network namespace issues with VF support (bug#1109038).\n- hv/netvsc: Fix NULL dereference at single queue mode fallback (bug#1109038).\n- hv_netvsc: fix race in napi poll when rescheduling (bug#1109038).\n- hv_netvsc: fix schedule in RCU context (bug#1109038).\n- hv_netvsc: Fix the return status in RX path (bug#1109038).\n- hv_netvsc: Fix the variable sizes in ipsecv2 and rsc offload (bug#1109038).\n- hv_netvsc: fix vf serial matching with pci slot info (bug#1109038).\n- hv_netvsc: ignore devices that are not PCI (bug#1109038).\n- hv_netvsc: move VF to same namespace as netvsc device (bug#1109038).\n- hv_netvsc: netvsc_teardown_gpadl() split (bsc#1109038).\n- hv_netvsc: only wake transmit queue if link is up (bug#1109038).\n- hv_netvsc: pair VF based on serial number (bug#1109038).\n- hv_netvsc: Pass net_device parameter to revoke and teardown functions (bug#1109038).\n- hv_netvsc: pass netvsc_device to rndis halt (bug#1109038).\n- hv_netvsc: preserve hw_features on mtu/channels/ringparam changes (bsc#1109038).\n- hv_netvsc: propogate Hyper-V friendly name into interface alias (bug#1109038).\n- hv_netvsc: select needed ucs2_string routine (bug#1109038).\n- hv_netvsc: set master device (bug#1109038).\n- hv_netvsc: Set tx_table to equal weight after subchannels open (bsc#1109038).\n- hv_netvsc: Simplify num_chn checking in rndis_filter_device_add() (bug#1109038).\n- hv_netvsc: simplify receive side calling arguments (bug#1109038).\n- hv_netvsc: Split netvsc_revoke_buf() and netvsc_teardown_gpadl() (bug#1109038).\n- hv_netvsc: split sub-channel setup into async and sync (bug#1109038).\n- hv_netvsc: typo in NDIS RSS parameters structure (bug#1109038).\n- hv_netvsc: use napi_schedule_irqoff (bug#1109038).\n- hv_netvsc: use RCU to fix concurrent rx and queue changes (bug#1109038).\n- hv_netvsc: use reciprocal divide to speed up percent calculation (bsc#1109038).\n- hv_netvsc: Use the num_online_cpus() for channel limit (bsc#1109038).\n- hv_netvsc: Use Windows version instead of NVSP version on GPAD teardown (bug#1109038).\n- hv: Synthetic typo correction (bug#1109038).\n- hv_vmbus: Correct the stale comments regarding cpu affinity (bug#1109038).\n- hwmon: (adt7475) Make adt7475_read_word() return errors (bnc#1012382).\n- hwmon: (ina2xx) fix sysfs shunt resistor read access (bnc#1012382).\n- hwrng: core - document the quality field (git-fixes).\n- hyper-v: Globalize vp_index (bug#1109038).\n- hyper-v: use GFP_KERNEL for hv_context.hv_numa_map (bug#1109038).\n- i2c: i2c-scmi: fix for i2c_smbus_write_block_data (bnc#1012382).\n- i2c: i801: Allow ACPI AML access I/O ports not reserved for SMBus (bnc#1012382).\n- i2c: i801: fix DNV's SMBCTRL register offset (bnc#1012382).\n- i2c: uniphier-f: issue STOP only for last message or I2C_M_STOP (bnc#1012382).\n- i2c: uniphier: issue STOP only for last message or I2C_M_STOP (bnc#1012382).\n- i2c: xiic: Make the start and the byte count write atomic (bnc#1012382).\n- i2c: xlp9xx: Add support for SMBAlert (bsc#1103308).\n- i2c: xlp9xx: Fix case where SSIF read transaction completes early (bsc#1103308).\n- i2c: xlp9xx: Fix issue seen when updating receive length (bsc#1103308).\n- i2c: xlp9xx: Make sure the transfer size is not more than I2C_SMBUS_BLOCK_SIZE (bsc#1103308).\n- IB/ipoib: Avoid a race condition between start_xmit and cm_rep_handler (bnc#1012382).\n- IB/srp: Avoid that sg_reset -d ${srp_device} triggers an infinite loop (bnc#1012382).\n- ib_srp: Remove WARN_ON in srp_terminate_io() (bsc#1094562).\n- Input: atakbd - fix Atari CapsLock behaviour (bnc#1012382).\n- Input: atakbd - fix Atari keymap (bnc#1012382).\n- Input: atmel_mxt_ts - only use first T9 instance (bnc#1012382).\n- Input: elantech - enable middle button of touchpad on ThinkPad P72 (bnc#1012382).\n- iommu/amd: Return devid as alias for ACPI HID devices (bsc#1106105).\n- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bnc#1012382).\n- iommu/ipmmu-vmsa: Fix allocation in atomic context (bnc#1012382).\n- ip6_tunnel: be careful when accessing the inner header (bnc#1012382).\n- ipmi:ssif: Add support for multi-part transmit messages > 2 parts (bsc#1103308).\n- ip_tunnel: be careful when accessing the inner header (bnc#1012382).\n- ipv4: fix use-after-free in ip_cmsg_recv_dstaddr() (bnc#1012382).\n- ipv6: fix possible use-after-free in ip6_xmit() (bnc#1012382).\n- ipvs: fix race between ip_vs_conn_new() and ip_vs_del_dest() (bnc#1012382).\n- irqchip/bcm7038-l1: Hide cpu offline callback when building for !SMP (bnc#1012382).\n- irqchip/gic-v3: Add missing barrier to 32bit version of gic_read_iar() (bnc#1012382).\n- iw_cxgb4: only allow 1 flush on user qps (bnc#1012382).\n- ixgbe: pci_set_drvdata must be called before register_netdev (Git-fixes bsc#1109923).\n- jffs2: return -ERANGE when xattr buffer is too small (bnc#1012382).\n- KABI: move the new handler to end of machdep_calls and hide it from genksyms (bsc#1094244).\n- kabi.pl: Consider GPL vs. non-GPL exports ()\n- kabi protect hnae_ae_ops (bsc#1107924).\n- kABI: protect struct hnae_desc_cb (kabi).\n- kbuild: add .DELETE_ON_ERROR special target (bnc#1012382).\n- kbuild: make missing $DEPMOD a Warning instead of an Error (bnc#1012382).\n- kernel-{binary,docs}.spec sort dependencies.\n- kernel-binary: pass ARCH= to kernel build Recent kernel does not save CONFIG_64BIT so it has to be specified by arch.\n- kernel-binary: pass MAKE_ARGS to install script as well.\n- kernel-binary.spec Remove superfluous [].\n- kernel-binary undefine unique_debug_names Some tools do not understand names like usr/lib/debug/boot/vmlinux-4.12.14-11.10-default-4.12.14-11.10.ppc64le.debug\n- kernel-obs-build.spec.in: add --no-hostonly-cmdline to dracut invocation (boo#1062303). call dracut with --no-hostonly-cmdline to avoid the random rootfs UUID being added into the initrd's /etc/cmdline.d/95root-dev.conf\n- kernel-obs-build.spec.in: enable xfs module This allows the public cloud team to build images with XFS as root filesystem\n- kernel-obs-build: use pae and lpae kernels where available (bsc#1073579).\n- kernel/params.c: downgrade warning for unsafe parameters (bsc#1050549).\n- kernel-source.spec: Align source numbering.\n- kernel-*.spec: remove remaining occurences of %release from dependencies There is a mix of %release and %source_rel in manually added dependencies and the %release dependencies tend to fail due to rebuild sync issues. So get rid of them.\n- kprobes/x86: Release insn_slot in failure path (bsc#1110006).\n- kthread: fix boot hang (regression) on MIPS/OpenRISC (bnc#1012382).\n- kthread: Fix use-after-free if kthread fork fails (bnc#1012382).\n- KVM: nVMX: Do not expose MPX VMX controls when guest MPX disabled (bsc#1106240).\n- KVM: nVMX: Do not flush TLB when vmcs12 uses VPID (bsc#1106240).\n- KVM: PPC: Book3S HV: Do not truncate HPTE index in xlate function (bnc#1012382).\n- KVM: x86: Do not re-{try,execute} after failed emulation in L2 (bsc#1106240).\n- KVM: x86: Do not use kvm_x86_ops->mpx_supported() directly (bsc#1106240).\n- KVM: x86: fix APIC page invalidation (bsc#1106240).\n- KVM: x86: remove eager_fpu field of struct kvm_vcpu_arch (bnc#1012382).\n- KVM/x86: remove WARN_ON() for when vm_munmap() fails (bsc#1106240).\n- KVM: x86: SVM: Call x86_spec_ctrl_set_guest/host() with interrupts disabled (bsc#1106240).\n- l2tp: cast l2tp traffic counter to unsigned (bsc#1099810).\n- lib/test_hexdump.c: fix failure on big endian cpu (bsc#1106110).\n- Limit kernel-source build to architectures for which we build binaries (bsc#1108281).\n- locking/osq_lock: Fix osq_lock queue corruption (bnc#1012382).\n- locking/rwsem-xadd: Fix missed wakeup due to reordering of load (bnc#1012382).\n- lpfc: fixup crash in lpfc_els_unsol_buffer() (bsc#1107318).\n- mac80211: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bnc#1012382).\n- mac80211: fix a race between restart and CSA flows (bnc#1012382).\n- mac80211: fix setting IEEE80211_KEY_FLAG_RX_MGMT for AP mode keys (bnc#1012382).\n- mac80211: Fix station bandwidth setting after channel switch (bnc#1012382).\n- mac80211_hwsim: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bnc#1012382).\n- mac80211: mesh: fix HWMP sequence numbering to follow standard (bnc#1012382).\n- mac80211: restrict delayed tailroom needed decrement (bnc#1012382).\n- mac80211: shorten the IBSS debug messages (bnc#1012382).\n- mach64: detect the dot clock divider correctly on sparc (bnc#1012382).\n- macintosh/via-pmu: Add missing mmio accessors (bnc#1012382).\n- macros.kernel-source: define linux_arch for KMPs (boo#1098050). CONFIG_64BIT is no longer defined so KMP spec files need to include %{?linux_make_arch} in any make call to build modules or descent into the kernel directory for any reason.\n- macros.kernel-source: Fix building non-x86 KMPs\n- macros.kernel-source: ignore errors when using make to print kernel release There is no way to handle the errors anyway and including the error into package version does not give good results.\n- macros.kernel-source: pass -b properly in kernel module package (bsc#1107870).\n- macros.kernel-source: pass -f properly in module subpackage (boo#1076393).\n- md-cluster: clear another node's suspend_area after the copy is finished (bnc#1012382).\n- md/raid1: exit sync request if MD_RECOVERY_INTR is set (git-fixes).\n- md/raid5: fix data corruption of replacements after originals dropped (bnc#1012382).\n- media: af9035: prevent buffer overflow on write (bnc#1012382).\n- media: exynos4-is: Prevent NULL pointer dereference in __isp_video_try_fmt() (bnc#1012382).\n- media: fsl-viu: fix error handling in viu_of_probe() (bnc#1012382).\n- media: omap3isp: zero-initialize the isp cam_xclk{a,b} initial data (bnc#1012382).\n- media: omap_vout: Fix a possible null pointer dereference in omap_vout_open() (bsc#1050431).\n- media: s3c-camif: ignore -ENOIOCTLCMD from v4l2_subdev_call for s_power (bnc#1012382).\n- media: soc_camera: ov772x: correct setting of banding filter (bnc#1012382).\n- media: tm6000: add error handling for dvb_register_adapter (bnc#1012382).\n- media: uvcvideo: Support realtek's UVC 1.5 device (bnc#1012382).\n- media: v4l: event: Prevent freeing event subscriptions while accessed (bnc#1012382).\n- media: videobuf2-core: check for q->error in vb2_core_qbuf() (bnc#1012382).\n- media: videobuf-dma-sg: Fix dma_{sync,unmap}_sg() calls (bsc#1050431).\n- mei: bus: type promotion bug in mei_nfc_if_version() (bnc#1012382).\n- mei: me: allow runtime pm for platform with D0i3 (bnc#1012382).\n- memory_hotplug: cond_resched in __remove_pages (bnc#1114178).\n- mfd: omap-usb-host: Fix dts probe of children (bnc#1012382).\n- mfd: sm501: Set coherent_dma_mask when creating subdevices (bnc#1012382).\n- mfd: ti_am335x_tscadc: Fix struct clk memory leak (bnc#1012382).\n- MIPS: ath79: fix system restart (bnc#1012382).\n- MIPS: Fix ISA virt/bus conversion for non-zero PHYS_OFFSET (bnc#1012382).\n- MIPS: jz4740: Bump zload address (bnc#1012382).\n- MIPS: loongson64: cs5536: Fix PCI_OHCI_INT_REG reads (bnc#1012382).\n- MIPS: Octeon: add missing of_node_put() (bnc#1012382).\n- MIPS: VDSO: Match data page cache colouring when D$ aliases (bnc#1012382).\n- MIPS: WARN_ON invalid DMA cache maintenance, not BUG_ON (bnc#1012382).\n- misc: hmc6352: fix potential Spectre v1 (bnc#1012382).\n- misc: mic: SCIF Fix scif_get_new_port() error handling (bnc#1012382).\n- misc: ti-st: Fix memory leak in the error path of probe() (bnc#1012382).\n- mkspec: do not build dtbs for architectures with no kernel.\n- mkspec: fix perl warning\n- mkspec: only build docs for default variant kernel.\n- mmc: mmci: stop building qcom dml as module (bsc#1110468).\n- mm/fadvise.c: fix signed overflow UBSAN complaint (bnc#1012382).\n- mm: fix devmem_is_allowed() for sub-page System RAM intersections (bsc#1110006).\n- mm: get rid of vmacache_flush_all() entirely (bnc#1012382).\n- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (bnc#1012382).\n- mm: /proc/pid/pagemap: hide swap entries from unprivileged users (Git-fixes bsc#1109907).\n- mm: shmem.c: Correctly annotate new inodes for lockdep (bnc#1012382).\n- mm/vmstat.c: fix outdated vmstat_text (bnc#1012382).\n- mm/vmstat.c: skip NR_TLB_REMOTE_FLUSH* properly (bnc#1012382).\n- mm/vmstat.c: skip NR_TLB_REMOTE_FLUSH* properly (git fixes).\n- module: exclude SHN_UNDEF symbols from kallsyms api (bnc#1012382).\n- move changes without Git-commit out of sorted section\n- mtdchar: fix overflows in adjustment of `count` (bnc#1012382).\n- mtd/maps: fix solutionengine.c printk format warnings (bnc#1012382).\n- neighbour: confirm neigh entries when ARP packet is received (bnc#1012382).\n- net/9p: fix error path of p9_virtio_probe (bnc#1012382).\n- net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT (bnc#1012382).\n- net: bcmgenet: use MAC link status for fixed phy (bnc#1012382).\n- net: cadence: Fix a sleep-in-atomic-context bug in macb_halt_tx() (bnc#1012382).\n- net: dcb: For wild-card lookups, use priority -1, not 0 (bnc#1012382).\n- net: ena: Eliminate duplicate barriers on weakly-ordered archs (bsc#1108240).\n- net: ena: fix device destruction to gracefully free resources (bsc#1108240).\n- net: ena: fix driver when PAGE_SIZE == 64kB (bsc#1108240).\n- net: ena: fix incorrect usage of memory barriers (bsc#1108240).\n- net: ena: fix missing calls to READ_ONCE (bsc#1108240).\n- net: ena: fix missing lock during device destruction (bsc#1108240).\n- net: ena: fix potential double ena_destroy_device() (bsc#1108240).\n- net: ena: fix surprise unplug NULL dereference kernel crash (bsc#1108240).\n- net: ethernet: mvneta: Fix napi structure mixup on armada 3700 (bsc#1110616).\n- net: ethernet: ti: cpsw: fix mdio device reference leak (bnc#1012382).\n- netfilter: x_tables: avoid stack-out-of-bounds read in xt_copy_counters_from_user (bnc#1012382).\n- net: hns: add netif_carrier_off before change speed and duplex (bsc#1107924).\n- net: hns: add the code for cleaning pkt in chip (bsc#1107924).\n- net: hns: fix length and page_offset overflow when CONFIG_ARM64_64K_PAGES (bnc#1012382).\n- net: hp100: fix always-true check for link up state (bnc#1012382).\n- net: ipv4: update fnhe_pmtu when first hop's MTU changes (bnc#1012382).\n- net/ipv6: Display all addresses in output of /proc/net/if_inet6 (bnc#1012382).\n- netlabel: check for IPV4MASK in addrinfo_get (bnc#1012382).\n- net: macb: disable scatter-gather for macb on sama5d3 (bnc#1012382).\n- net/mlx4: Use cpumask_available for eq->affinity_mask (bnc#1012382).\n- net: mvneta: fix mtu change on port without link (bnc#1012382).\n- net: mvneta: fix mvneta_config_rss on armada 3700 (bsc#1110615).\n- net: mvpp2: Extract the correct ethtype from the skb for tx csum offload (bnc#1012382).\n- net: systemport: Fix wake-up interrupt race during resume (bnc#1012382).\n- net/usb: cancel pending work when unbinding smsc75xx (bnc#1012382).\n- netvsc: delay setup of VF device (bug#1109038).\n- netvsc: fix race during initialization (bug#1109038).\n- netvsc: fix race on sub channel creation (bug#1109038).\n- netvsc: remove bonding setup script (bug#1109038).\n- NFC: Fix possible memory corruption when handling SHDLC I-Frame commands (bnc#1012382).\n- NFC: Fix the number of pipes (bnc#1012382).\n- NFS: add nostatflush mount option (bsc#1065726).\n- NFS: Avoid quadratic search when freeing delegations (bsc#1084760).\n- nfsd: fix corrupted reply to badly ordered compound (bnc#1012382).\n- NFS: Use an appropriate work queue for direct-write completion (bsc#1082519).\n- NFSv4.0 fix client reference leak in callback (bnc#1012382).\n- nvme_fc: add 'nvme_discovery' sysfs attribute to fc transport device (bsc#1044189).\n- nvmet: fixup crash on NULL device path (bsc#1082979).\n- ocfs2: fix locking for res->tracking and dlm->tracking_list (bnc#1012382).\n- ocfs2: fix ocfs2 read block panic (bnc#1012382).\n- of: unittest: Disable interrupt node tests for old world MAC systems (bnc#1012382).\n- ovl: Copy inode attributes after setting xattr (bsc#1107299).\n- ovl: modify ovl_permission() to do checks on two inodes (bsc#1106512)\n- ovl: proper cleanup of workdir (bnc#1012382).\n- ovl: rename is_merge to is_lowest (bnc#1012382).\n- parport: sunbpp: fix error return code (bnc#1012382).\n- partitions/aix: append null character to print data from disk (bnc#1012382).\n- partitions/aix: fix usage of uninitialized lv_info and lvname structures (bnc#1012382).\n- Pass x86 as architecture on x86_64 and i386 (bsc#1093118).\n- pci: altera: Fix bool initialization in tlp_read_packet() (bsc#1109806).\n- pci: designware: Fix I/O space page leak (bsc#1109806).\n- pci: designware: Fix pci_remap_iospace() failure path (bsc#1109806).\n- pci: hv: Convert remove_lock to refcount (bug#1109038).\n- pci: hv: Do not wait forever on a device that has disappeared (bug#1109038).\n- pci: hv: Fix return value check in hv_pci_assign_slots() (bug#1109038).\n- pci: hv: Make sure the bus domain is really unique (bug#1109038).\n- pci: hv: Remove unused reason for refcount handler (bug#1109038).\n- pci: hv: Replace GFP_ATOMIC with GFP_KERNEL in new_pcichild_device() (bug#1109038).\n- pci: hv: support reporting serial number as slot information (bug#1109038).\n- pci: hv: Use effective affinity mask (bsc#1109038).\n- pci: hv: Use effective affinity mask (bsc#1109772).\n- pci: hv: Use list_for_each_entry() (bug#1109038).\n- pci: mvebu: Fix I/O space end address calculation (bnc#1012382).\n- pci: OF: Fix I/O space page leak (bsc#1109806).\n- pci: pciehp: Fix unprotected list iteration in IRQ handler (bsc#1109806).\n- pci: Reprogram bridge prefetch registers on resume (bnc#1012382).\n- pci: shpchp: Fix AMD POGO identification (bsc#1109806).\n- pci: Supply CPU physical address (not bus address) to iomem_is_exclusive() (bsc#1109806).\n- pci: versatile: Fix I/O space page leak (bsc#1109806).\n- pci: versatile: Fix pci_remap_iospace() failure path (bsc#1109806).\n- pci: xgene: Fix I/O space page leak (bsc#1109806).\n- pci: xilinx: Add missing of_node_put() (bsc#1109806).\n- perf powerpc: Fix callchain ip filtering (bnc#1012382).\n- perf powerpc: Fix callchain ip filtering when return address is in a register (bnc#1012382).\n- perf probe powerpc: Ignore SyS symbols irrespective of endianness (bnc#1012382).\n- perf script python: Fix export-to-postgresql.py occasional failure (bnc#1012382).\n- perf tools: Allow overriding MAX_NR_CPUS at compile time (bnc#1012382).\n- phy: qcom-ufs: add MODULE_LICENSE tag (bsc#1110468).\n- pinctrl: qcom: spmi-gpio: Fix pmic_gpio_config_get() to be compliant (bnc#1012382).\n- pipe: actually allow root to exceed the pipe buffer limit (git-fixes).\n- platform/x86: alienware-wmi: Correct a memory leak (bnc#1012382).\n- platform/x86: asus-nb-wmi: Add keymap entry for lid flip action on UX360 (bnc#1012382).\n- platform/x86: toshiba_acpi: Fix defined but not used build warnings (bnc#1012382).\n- PM / core: Clear the direct_complete flag on errors (bnc#1012382).\n- powerpc/64: Do load of PACAKBASE in LOAD_HANDLER (bsc#1094244).\n- powerpc/64s: move machine check SLB flushing to mm/slb.c (bsc#1094244).\n- powerpc/book3s: Fix MCE console messages for unrecoverable MCE (bsc#1094244).\n- powerpc/fadump: cleanup crash memory ranges support (bsc#1103269).\n- powerpc/fadump: re-register firmware-assisted dump if already registered (bsc#1108170, bsc#1108823).\n- powerpc: Fix size calculation using resource_size() (bnc#1012382).\n- powerpc/kdump: Handle crashkernel memory reservation failure (bnc#1012382).\n- powerpc/mce: Fix SLB rebolting during MCE recovery path (bsc#1094244).\n- powerpc/mce: Move 64-bit machine check code into mce.c (bsc#1094244).\n- powerpc/numa: Skip onlining a offline node in kdump path (bsc#1109784).\n- powerpc/numa: Use associativity if VPHN hcall is successful (bsc#1110363).\n- powerpc/perf/hv-24x7: Fix off-by-one error in request_buffer check (git-fixes).\n- powerpc/perf/hv-24x7: Fix passing of catalog version number (bsc#1053043).\n- powerpc/powernv/ioda2: Reduce upper limit for DMA window size (bsc#1066223).\n- powerpc/powernv: opal_put_chars partial write fix (bnc#1012382).\n- powerpc/powernv: Rename machine_check_pSeries_early() to powernv (bsc#1094244).\n- powerpc/pseries: Avoid using the size greater than RTAS_ERROR_LOG_MAX (bnc#1012382).\n- powerpc/pseries: Defer the logging of rtas error to irq work queue (bsc#1094244).\n- powerpc/pseries: Define MCE error event section (bsc#1094244).\n- powerpc/pseries: Disable CPU hotplug across migrations (bsc#1066223).\n- powerpc/pseries: Display machine check error details (bsc#1094244).\n- powerpc/pseries: Dump the SLB contents on SLB MCE errors (bsc#1094244).\n- powerpc/pseries: Fix build break for SPLPAR=n and CPU hotplug (bsc#1079524, git-fixes).\n- powerpc/pseries: Fix CONFIG_NUMA=n build (bsc#1067906, git-fixes).\n- powerpc/pseries: Flush SLB contents on SLB MCE errors (bsc#1094244).\n- powerpc/pseries/mm: call H_BLOCK_REMOVE (bsc#1109158).\n- powerpc/pseries/mm: factorize PTE slot computation (bsc#1109158).\n- powerpc/pseries/mm: Introducing FW_FEATURE_BLOCK_REMOVE (bsc#1109158).\n- powerpc/pseries: Remove prrn_work workqueue (bsc#1102495, bsc#1109337).\n- powerpc/pseries: Remove unneeded uses of dlpar work queue (bsc#1102495, bsc#1109337).\n- powerpc/rtas: Fix a potential race between CPU-Offline & Migration (bsc#1111870).\n- powerpc/tm: Avoid possible userspace r1 corruption on reclaim (bsc#1109333).\n- powerpc/tm: Fix userspace r13 corruption (bsc#1109333).\n- power: vexpress: fix corruption in notifier registration (bnc#1012382).\n- printk: do not spin in printk when in nmi (bsc#1094244).\n- proc: restrict kernel stack dumps to root (bnc#1012382).\n- pstore: Fix incorrect persistent ram buffer mapping (bnc#1012382).\n- qlcnic: fix Tx descriptor corruption on 82xx devices (bnc#1012382).\n- r8169: Clear RTL_FLAG_TASK_*_PENDING when clearing RTL_FLAG_TASK_ENABLED (bnc#1012382).\n- RAID10 BUG_ON in raise_barrier when force is true and conf->barrier is 0 (bnc#1012382).\n- rculist: add list_for_each_entry_from_rcu() (bsc#1084760).\n- rculist: Improve documentation for list_for_each_entry_from_rcu() (bsc#1084760).\n- RDMA/cma: Do not ignore net namespace for unbound cm_id (bnc#1012382).\n- RDMA/cma: Protect cma dev list with lock (bnc#1012382).\n- RDMA/rw: Fix rdma_rw_ctx_signature_init() kernel-doc header (bsc#1082979).\n- RDMA/ucma: check fd type in ucma_migrate_id() (bnc#1012382).\n- README: Clean-up trailing whitespace\n- reiserfs: add check to detect corrupted directory entry (bsc#1109818).\n- reiserfs: change j_timestamp type to time64_t (bnc#1012382).\n- reiserfs: do not panic on bad directory entries (bsc#1109818).\n- resource: Include resource end in walk_*() interfaces (bsc#1114648).\n- Revert 'ARM: imx_v6_v7_defconfig: Select ULPI support' (bnc#1012382).\n- Revert 'btrfs: qgroups: Retry after commit on getting EDQUOT' (bsc#1031392).\n- Revert 'dma-buf/sync-file: Avoid enable fence signaling if poll(.timeout=0)' (bsc#1111363).\n- Revert 'drm: Do not pass negative delta to ktime_sub_ns()' (bsc#1106929)\n- Revert 'drm/i915: Initialize HWS page address after GPU reset' (bsc#1106929)\n- Revert 'Drop kernel trampoline stack.' This reverts commit 85dead31706c1c1755adff90405ff9861c39c704.\n- Revert 'kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)' This reverts commit edde1f21880e3bfe244c6f98a3733b05b13533dc.\n- Revert 'KVM: x86: remove eager_fpu field of struct kvm_vcpu_arch' (kabi).\n- Revert 'media: v4l: event: Prevent freeing event subscriptions while accessed' (kabi).\n- Revert 'mm: get rid of vmacache_flush_all() entirely' (kabi).\n- Revert 'proc: restrict kernel stack dumps to root' (kabi).\n- Revert 'Skip intel_crt_init for Dell XPS 8700' (bsc#1106929)\n- Revert 'usb: cdc-wdm: Fix a sleep-in-atomic-context bug in service_outstanding_interrupt()' (bnc#1012382).\n- ring-buffer: Allow for rescheduling when removing pages (bnc#1012382).\n- rndis_wlan: potential buffer overflow in rndis_wlan_auth_indication() (bnc#1012382).\n- rpm/kernel-binary.spec.in: Check module licenses (bsc#1083215,bsc#1083527)\n- rpm/kernel-binary.spec.in: Do not sign modules if CONFIG_MODULE_SIG=n (bsc#1035053)\n- rpm/kernel-binary.spec.in: Obsolete ftsteutates KMP (boo#997172)\n- rpm/kernel-binary.spec.in: Only kernel-syzkaller needs gcc-devel (boo#1043591).\n- rpm/kernel-docs.spec.in: Expand kernel tree directly from sources (bsc#1057199)\n- rpm/kernel-docs.spec.in: refresh dependencies for PDF build (bsc#1048129)\n- rpm/kernel-module-subpackage: Generate proper supplements in the template ... instead of relying on find-provides.ksyms to do it (bsc#981083).\n- rpm/kernel-source.spec.in: Do not list deleted depdendency helpers (bsc#981083).\n- rpm/kernel-spec-macros: Try harder to detect Build Service environment (bsc#1078788)\n- rpmsg: Correct support for MODULE_DEVICE_TABLE() (git-fixes).\n- rtc: bq4802: add error handling for devm_ioremap (bnc#1012382).\n- rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096 (bnc#1012382).\n- s390/chsc: Add exception handler for CHSC instruction (git-fixes).\n- s390/dasd: fix hanging offline processing due to canceled worker (bnc#1012382).\n- s390/extmem: fix gcc 8 stringop-overflow warning (bnc#1012382).\n- s390/facilites: use stfle_fac_list array size for MAX_FACILITY_BIT (bnc#1108315, LTC#171326).\n- s390/kdump: Fix elfcorehdr size calculation (git-fixes).\n- s390/kdump: Make elfcorehdr size calculation ABI compliant (git-fixes).\n- s390/lib: use expoline for all bcr instructions (LTC#171029 bnc#1012382 bnc#1106934).\n- s390/mm: correct allocate_pgste proc_handler callback (git-fixes).\n- s390/qeth: do not dump past end of unknown HW header (bnc#1012382).\n- s390/qeth: fix race in used-buffer accounting (bnc#1012382).\n- s390/qeth: handle failure on workqueue creation (git-fixes).\n- s390/qeth: reset layer2 attribute on layer switch (bnc#1012382).\n- s390/qeth: use vzalloc for QUERY OAT buffer (bnc#1108315, LTC#171527).\n- s390: revert ELF_ET_DYN_BASE base changes (git-fixes).\n- s390/stacktrace: fix address ranges for asynchronous and panic stack (git-fixes).\n- sched/fair: Fix bandwidth timer clock drift condition (Git-fixes).\n- sched/fair: Fix vruntime_normalized() for remote non-migration wakeup (Git-fixes).\n- sched/isolcpus: Fix 'isolcpus=' boot parameter handling when !CONFIG_CPUMASK_OFFSTACK (bug#1109038).\n- sch_hhf: fix null pointer dereference on init failure (bnc#1012382).\n- sch_htb: fix crash on init failure (bnc#1012382).\n- sch_multiq: fix double free on init failure (bnc#1012382).\n- sch_netem: avoid null pointer deref on init failure (bnc#1012382).\n- sch_tbf: fix two null pointer dereferences on init failure (bnc#1012382).\n- scripts: modpost: check memory allocation results (bnc#1012382).\n- scsi: 3ware: fix return 0 on the error path of probe (bnc#1012382).\n- scsi: aic94xx: fix an error code in aic94xx_init() (bnc#1012382).\n- scsi: bnx2i: add error handling for ioremap_nocache (bnc#1012382).\n- scsi: ibmvscsi: Improve strings handling (bnc#1012382).\n- scsi: ipr: System hung while dlpar adding primary ipr adapter back (bsc#1109336).\n- scsi: klist: Make it safe to use klists in atomic context (bnc#1012382).\n- scsi: netvsc: Use the vmbus function to calculate ring buffer percentage (bug#1109038).\n- scsi: qla2xxx: Add changes for devloss timeout in driver (bsc#1084427).\n- scsi: qla2xxx: Add FC-NVMe abort processing (bsc#1084427).\n- scsi: qla2xxx: Add longer window for chip reset (bsc#1094555).\n- scsi: qla2xxx: Avoid double completion of abort command (bsc#1094555).\n- scsi: qla2xxx: Cleanup code to improve FC-NVMe error handling (bsc#1084427).\n- scsi: qla2xxx: Cleanup for N2N code (bsc#1094555).\n- scsi: qla2xxx: correctly shift host byte (bsc#1094555).\n- scsi: qla2xxx: Correct setting of SAM_STAT_CHECK_CONDITION (bsc#1094555).\n- scsi: qla2xxx: Delete session for nport id change (bsc#1094555).\n- scsi: qla2xxx: Fix Async GPN_FT for FCP and FC-NVMe scan (bsc#1084427).\n- scsi: qla2xxx: Fix crash on qla2x00_mailbox_command (bsc#1094555).\n- scsi: qla2xxx: Fix double free bug after firmware timeout (bsc#1094555).\n- scsi: qla2xxx: Fix driver unload by shutting down chip (bsc#1094555).\n- scsi: qla2xxx: fix error message on <qla2400 (bsc#1094555).\n- scsi: qla2xxx: Fix FC-NVMe IO abort during driver reset (bsc#1084427).\n- scsi: qla2xxx: Fix function argument descriptions (bsc#1094555).\n- scsi: qla2xxx: Fix Inquiry command being dropped in Target mode (bsc#1094555).\n- scsi: qla2xxx: Fix issue reported by static checker for qla2x00_els_dcmd2_sp_done() (bsc#1094555).\n- scsi: qla2xxx: Fix login retry count (bsc#1094555).\n- scsi: qla2xxx: Fix Management Server NPort handle reservation logic (bsc#1094555).\n- scsi: qla2xxx: Fix memory leak for allocating abort IOCB (bsc#1094555).\n- scsi: qla2xxx: Fix n2n_ae flag to prevent dev_loss on PDB change (bsc#1084427).\n- scsi: qla2xxx: Fix N2N link re-connect (bsc#1094555).\n- scsi: qla2xxx: Fix NPIV deletion by calling wait_for_sess_deletion (bsc#1094555).\n- scsi: qla2xxx: Fix race between switch cmd completion and timeout (bsc#1094555).\n- scsi: qla2xxx: Fix race condition between iocb timeout and initialisation (bsc#1094555).\n- scsi: qla2xxx: Fix redundant fc_rport registration (bsc#1094555).\n- scsi: qla2xxx: Fix retry for PRLI RJT with reason of BUSY (bsc#1084427).\n- scsi: qla2xxx: Fix Rport and session state getting out of sync (bsc#1094555).\n- scsi: qla2xxx: Fix sending ADISC command for login (bsc#1094555).\n- scsi: qla2xxx: Fix session state stuck in Get Port DB (bsc#1094555).\n- scsi: qla2xxx: Fix stalled relogin (bsc#1094555).\n- scsi: qla2xxx: Fix TMF and Multi-Queue config (bsc#1094555).\n- scsi: qla2xxx: Fix unintended Logout (bsc#1094555).\n- scsi: qla2xxx: Fix unintialized List head crash (bsc#1094555).\n- scsi: qla2xxx: Flush mailbox commands on chip reset (bsc#1094555).\n- scsi: qla2xxx: fx00 copypaste typo (bsc#1094555).\n- scsi: qla2xxx: Migrate NVME N2N handling into state machine (bsc#1094555).\n- scsi: qla2xxx: Move GPSC and GFPNID out of session management (bsc#1094555).\n- scsi: qla2xxx: Prevent relogin loop by removing stale code (bsc#1094555).\n- scsi: qla2xxx: Prevent sysfs access when chip is down (bsc#1094555).\n- scsi: qla2xxx: Reduce redundant ADISC command for RSCNs (bsc#1094555).\n- scsi: qla2xxx: remove irq save in qla2x00_poll() (bsc#1094555).\n- scsi: qla2xxx: Remove nvme_done_list (bsc#1084427).\n- scsi: qla2xxx: Remove stale debug value for login_retry flag (bsc#1094555).\n- scsi: qla2xxx: Remove unneeded message and minor cleanup for FC-NVMe (bsc#1084427).\n- scsi: qla2xxx: Restore ZIO threshold setting (bsc#1084427).\n- scsi: qla2xxx: Return busy if rport going away (bsc#1084427).\n- scsi: qla2xxx: Save frame payload size from ICB (bsc#1094555).\n- scsi: qla2xxx: Set IIDMA and fcport state before qla_nvme_register_remote() (bsc#1084427).\n- scsi: qla2xxx: Silent erroneous message (bsc#1094555).\n- scsi: qla2xxx: Update driver version to 10.00.00.06-k (bsc#1084427).\n- scsi: qla2xxx: Update driver version to 10.00.00.07-k (bsc#1094555).\n- scsi: qla2xxx: Update driver version to 10.00.00.08-k (bsc#1094555).\n- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1094555).\n- scsi: qla2xxx: Use predefined get_datalen_for_atio() inline function (bsc#1094555).\n- scsi: scsi_transport_fc: Add dummy initiator role to rport (bug#1109038).\n- scsi: storsvc: do not set a bounce limit (bug#1109038).\n- scsi: storvsc: Add support for FC rport (bug#1109038).\n- scsi: storvsc: Allow only one remove lun work item to be issued per lun (bsc#1109038).\n- scsi: storvsc: Avoid allocating memory for temp cpumasks (bug#1109038).\n- scsi: storvsc: Avoid excessive host scan on controller change (bsc#1109038).\n- scsi: storvsc: missing error code in storvsc_probe() (bsc#1109038).\n- scsi: storvsc: Select channel based on available percentage of ring buffer to write (bug#1109038).\n- scsi: storvsc: Set up correct queue depth values for IDE devices (bug#1109038).\n- scsi: storvsc: Spread interrupts when picking a channel for I/O requests (bug#1109038).\n- scsi: storvsc: use default I/O timeout handler for FC devices (bug#1109038).\n- scsi: storvsc: use in place iterator function (bug#1109038).\n- scsi: target: fix __transport_register_session locking (bnc#1012382).\n- scsi: target/iscsi: Make iscsit_ta_authentication() respect the output buffer size (bnc#1012382).\n- scsi: vmbus: Add function to report available ring buffer to write in total ring size percentage (bug#1109038).\n- selftests/efivarfs: add required kernel configs (bnc#1012382).\n- selftests/powerpc: Kill child processes on SIGINT (bnc#1012382).\n- selftest: timers: Tweak raw_skew to SKIP when ADJ_OFFSET/other clock adjustments are in progress (bnc#1012382).\n- selinux: use GFP_NOWAIT in the AVC kmem_caches (bnc#1012382).\n- serial: cpm_uart: return immediately from console poll (bnc#1012382).\n- serial: imx: restore handshaking irq for imx1 (bnc#1012382).\n- signal: Properly deliver SIGSEGV from x86 uprobes (bsc#1110006).\n- silence build warning in hyperv_init\n- silence buildwarnings in hyperv/mmu.c\n- slub: make ->cpu_partial unsigned int (bnc#1012382).\n- smb2: fix missing files in root share directory listing (bnc#1012382).\n- smb3: fill in statfs fsid and correct namelen (bsc#1112905).\n- smb3: fix reset of bytes read and written stats (bnc#1012382).\n- smb3: Number of requests sent should be displayed for SMB3 not just CIFS (bnc#1012382).\n- sound: enable interrupt after dma buffer initialization (bnc#1012382).\n- spi: rspi: Fix interrupted DMA transfers (bnc#1012382).\n- spi: rspi: Fix invalid SPI use during system suspend (bnc#1012382).\n- spi: sh-msiof: Fix handling of write value for SISTR register (bnc#1012382).\n- spi: sh-msiof: Fix invalid SPI use during system suspend (bnc#1012382).\n- spi: tegra20-slink: explicitly enable/disable clock (bnc#1012382).\n- split-modules: use MAKE_ARGS\n- srcu: Allow use of Tiny/Tree SRCU from both process and interrupt context (bsc#1050549).\n- staging: android: ashmem: Fix mmap size validation (bnc#1012382).\n- staging: android: ion: fix ION_IOC_{MAP,SHARE} use-after-free (bnc#1012382).\n- staging: comedi: ni_mio_common: fix subdevice flags for PFI subdevice (bnc#1012382).\n- staging: rt5208: Fix a sleep-in-atomic bug in xd_copy_page (bnc#1012382).\n- staging: rts5208: fix missing error check on call to rtsx_write_register (bnc#1012382).\n- staging/rts5208: Fix read overflow in memcpy (bnc#1012382).\n- stmmac: fix valid numbers of unicast filter entries (bnc#1012382).\n- stop_machine: Atomically queue and wake stopper threads (git-fixes).\n- target: log Data-Out timeouts as errors (bsc#1095805).\n- target: log NOP ping timeouts as errors (bsc#1095805).\n- target: split out helper for cxn timeout error stashing (bsc#1095805).\n- target: stash sess_err_stats on Data-Out timeout (bsc#1095805).\n- target: use ISCSI_IQN_LEN in iscsi_target_stat (bsc#1095805).\n- tcp: add tcp_ooo_try_coalesce() helper (bnc#1012382).\n- tcp: call tcp_drop() from tcp_data_queue_ofo() (bnc#1012382).\n- tcp: do not restart timewait timer on rst reception (bnc#1012382).\n- tcp: fix a stale ooo_last_skb after a replace (bnc#1012382).\n- tcp: free batches of packets in tcp_prune_ofo_queue() (bnc#1012382).\n- tcp: increment sk_drops for dropped rx packets (bnc#1012382).\n- tcp: use an RB tree for ooo receive queue (bnc#1012382).\n- team: Forbid enslaving team device to itself (bnc#1012382).\n- thermal: of-thermal: disable passive polling when thermal zone is disabled (bnc#1012382).\n- tools: hv: fcopy: set 'error' in case an unknown operation was requested (bug#1109038).\n- tools: hv: Fix a bug in the key delete code (bnc#1012382).\n- tools: hv: fix compiler warnings about major/target_fname (bug#1109038).\n- tools/hv: Fix IP reporting by KVP daemon with SRIOV (bug#1109038).\n- tools: hv: fix snprintf warning in kvp_daemon (bug#1109038).\n- tools: hv: ignore a NIC if it has been configured (bug#1109038).\n- tools: hv: include string.h in hv_fcopy_daemon (bug#1109038).\n- tools: hv: update buffer handling in hv_fcopy_daemon (bug#1109038).\n- tools: hv: update lsvmbus to be compatible with python3 (bug#1109038).\n- tools: hv: vss: fix loop device detection (bug#1109038).\n- tools: hv: vss: Skip freezing filesystems backed by loop (bug#1109038).\n- tools/vm/page-types.c: fix 'defined but not used' warning (bnc#1012382).\n- tools/vm/slabinfo.c: fix sign-compare warning (bnc#1012382).\n- tpm: Restore functionality to xen vtpm driver (bsc#1020645, git-fixes).\n- tsl2550: fix lux1_input error in low light (bnc#1012382).\n- tty: Drop tty->count on tty_reopen() failure (bnc#1105428).\n- tty: rocket: Fix possible buffer overwrite on register_PCI (bnc#1012382).\n- tty: vt_ioctl: fix potential Spectre v1 (bnc#1012382).\nt usb: yurex: Fix buffer over-read in yurex_write() (bnc#1012382).\n- ubifs: Check for name being NULL while mounting (bnc#1012382).\n- ucma: fix a use-after-free in ucma_resolve_ip() (bnc#1012382).\n- uio_hv_generic: add rescind support (bsc#1109038).\n- uio_hv_generic: check that host supports monitor page (bsc#1109038).\n- uio_hv_generic: create send and receive buffers (bsc#1109038).\n- uio_hv_generic: fix configuration comments (bsc#1109038).\n- uio_hv_generic: fix new type mismatch warnings (bsc#1109038).\n- uio_hv_generic: fix type mismatch warnings (bsc#1109038).\n- uio_hv_generic: use ISR callback method (bsc#1109038).\n- uio_hv_generic: use standard mmap for resources (bsc#1109038).\n- uio: potential double frees if __uio_register_device() fails (bnc#1012382).\n- usb: add quirk for WORLDE Controller KS49 or Prodipe MIDI 49C USB controller (bnc#1012382).\n- usb: Add quirk to support DJI CineSSD (bnc#1012382).\n- usb: Avoid use-after-free by flushing endpoints early in usb_set_interface() (bnc#1012382).\n- usb: cdc-wdm: Fix a sleep-in-atomic-context bug in service_outstanding_interrupt() (bnc#1012382).\n- usb: Do not die twice if PCI xhci host is not responding in resume (bnc#1012382).\n- usb: fix error handling in usb_driver_claim_interface() (bnc#1012382).\n- usb: gadget: fotg210-udc: Fix memory leak of fotg210->ep[i] (bnc#1012382).\n- usb: gadget: serial: fix oops when data rx'd after close (bnc#1012382).\n- usb: handle NULL config in usb_find_alt_setting() (bnc#1012382).\n- usb: host: u132-hcd: Fix a sleep-in-atomic-context bug in u132_get_frame() (bnc#1012382).\n- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).\n- usb: misc: uss720: Fix two sleep-in-atomic-context bugs (bnc#1012382).\n- usb: net2280: Fix erroneous synchronization change (bnc#1012382).\n- usb: remove LPM management from usb_driver_claim_interface() (bnc#1012382).\n- usb: serial: io_ti: fix array underflow in completion handler (bnc#1012382).\n- usb: serial: kobil_sct: fix modem-status error handling (bnc#1012382).\n- usb: serial: simple: add Motorola Tetra MTP6550 id (bnc#1012382).\n- usb: serial: ti_usb_3410_5052: fix array underflow in completion handler (bnc#1012382).\n- usb: usbdevfs: restore warning for nonsensical flags (bnc#1012382).\n- usb: usbdevfs: sanitize flags more (bnc#1012382).\n- usb: wusbcore: security: cast sizeof to int for comparison (bnc#1012382).\n- usb: yurex: Check for truncation in yurex_read() (bnc#1012382).\n- use the new async probing feature for the hyperv drivers (bug#1109038).\n- Use upstream version of pci-hyperv change 35a88a18d7\n- uwb: hwa-rc: fix memory leak at probe (bnc#1012382).\n- vfs: do not test owner for NFS in set_posix_acl() (bsc#1103405).\n- video: goldfishfb: fix memory leak on driver remove (bnc#1012382).\n- vmbus: add monitor_id and subchannel_id to sysfs per channel (bsc#1109038).\n- vmbus: do not return values for uninitalized channels (bug#1109038).\n- vmbus: make channel attributes static (bsc#1109038).\n- vmbus: make hv_get_ringbuffer_availbytes local (bsc#1109038).\n- vmci: type promotion bug in qp_host_get_user_memory() (bnc#1012382).\n- vmw_balloon: include asm/io.h (bnc#1012382).\n- vti6: remove !skb->ignore_df check from vti6_xmit() (bnc#1012382).\n- watchdog: w83627hf: Added NCT6102D support (bsc#1106434).\n- watchdog: w83627hf_wdt: Add quirk for Inves system (bsc#1106434).\n- wlcore: Add missing PM call for wlcore_cmd_wait_for_event_or_timeout() (bnc#1012382).\n- wlcore: Fix memory leak in wlcore_cmd_wait_for_event_or_timeout (git-fixes).\n- x86/apic: Fix restoring boot IRQ mode in reboot and kexec/kdump (bsc#1110006).\n- x86/apic: Split disable_IO_APIC() into two functions to fix CONFIG_KEXEC_JUMP=y (bsc#1110006).\n- x86/apic: Split out restore_boot_irq_mode() from disable_IO_APIC() (bsc#1110006).\n- x86/boot: Fix 'run_size' calculation (bsc#1110006).\n- x86/cpufeature: deduplicate X86_FEATURE_L1TF_PTEINV (kabi).\n- x86/entry/64: Add two more instruction suffixes (bnc#1012382).\n- x86/entry/64: Clear registers for exceptions/interrupts, to reduce speculation attack surface (bsc#1105931).\n- x86/entry/64: Remove %ebx handling from error_entry/exit (bnc#1102715).\n- x86/entry/64: sanitize extra registers on syscall entry (bsc#1105931).\n- x86/fpu: Finish excising 'eagerfpu' (bnc#1012382).\n- x86/fpu: Remove second definition of fpu in __fpu__restore_sig() (bsc#1110006).\n- x86/fpu: Remove struct fpu::counter (bnc#1012382).\n- x86/fpu: Remove use_eager_fpu() (bnc#1012382).\n- x86/headers/UAPI: Use __u64 instead of u64 in <uapi/asm/hyperv.h> (bug#1109038).\n- x86/hyperv: Add a function to read both TSC and TSC page value simulateneously (bsc#1109038).\n- x86/hyperv: Add interrupt handler annotations (bug#1109038).\n- x86/hyper-v: allocate and use Virtual Processor Assist Pages (bug#1109038).\n- x86/hyper-V: Allocate the IDT entry early in boot (bug#1109038).\n- x86/hyper-v: Check cpumask_to_vpset() return value in hyperv_flush_tlb_others_ex() (bug#1109038).\n- x86/hyperv: Check for required priviliges in hyperv_init() (bsc#1109038).\n- x86/hyper-v: Check for VP_INVAL in hyperv_flush_tlb_others() (bug#1109038).\n- x86/hyperv: Clear vCPU banks between calls to avoid flushing unneeded vCPUs (bsc#1109038).\n- x86/Hyper-V: Consolidate the allocation of the hypercall input page (bug#1109038).\n- x86/hyper-v: define struct hv_enlightened_vmcs and clean field bits (bug#1109038).\n- x86/hyper-v: detect nested features (bug#1109038).\n- x86/hyperv: Do not use percpu areas for pcpu_flush/pcpu_flush_ex structures (bsc#1109038).\n- x86/Hyper-V: Enable IPI enlightenments (bug#1109038).\n- x86/Hyper-V: Enhanced IPI enlightenment (bug#1109038).\n- x86/Hyper-V: Enlighten APIC access (bug#1109038).\n- x86/hyperv: Fix hypercalls with extended CPU ranges for TLB flushing (bsc#1109038).\n- x86/hyper-v: Fix the circular dependency in IPI enlightenment (bug#1109038).\n- x86/hyper-v: Fix wrong merge conflict resolution (bug#1109038).\n- x86/Hyper-V/hv_apic: Build the Hyper-V APIC conditionally (bug#1109038).\n- x86/Hyper-V/hv_apic: Include asm/apic.h (bug#1109038).\n- x86/hyper-v: Implement hv_do_fast_hypercall16 (bug#1109038).\n- x86/hyper-v: Implement rep hypercalls (bug#1109038).\n- x86/hyper-v: move definitions from TLFS to hyperv-tlfs.h (bug#1109038).\n- x86/hyper-v: move hyperv.h out of uapi (bug#1109038).\n- x86/hyper-v: move struct hv_flush_pcpu{,ex} definitions to common header (bug#1109038).\n- x86/hyperv: Read TSC frequency from a synthetic MSR (bug#1109038).\n- x86/hyperv: Redirect reenlightment notifications on CPU offlining (bug#1109038).\n- x86/hyperv: Reenlightenment notifications support (bug#1109038).\n- x86/hyper-v: Remove duplicated HV_X64_EX_PROCESSOR_MASKS_RECOMMENDED definition (bug#1109038).\n- x86/hyper-v: rename ipi_arg_{ex,non_ex} structures (bug#1109038).\n- x86/hyper-v: stash the max number of virtual/logical processor (bug#1109038).\n- x86/hyperv: Stop suppressing X86_FEATURE_PCID (bsc#1109038).\n- x86/hyper-v: Support extended CPU ranges for TLB flush hypercalls (bug#1109038).\n- x86/hyper-v: Use cheaper HVCALL_FLUSH_VIRTUAL_ADDRESS_{LIST,SPACE} hypercalls when possible (bug#1109038).\n- x86/hyper-v: Use cheaper HVCALL_SEND_IPI hypercall when possible (bug#1109038).\n- x86/hyper-v: Use 'fast' hypercall for HVCALL_SEND_IPI (bug#1109038).\n- x86/hyper-v: Use hypercall for remote TLB flush (bug#1109038).\n- x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772).\n- x86/kaiser: Avoid loosing NMIs when using trampoline stack (bsc#1106293 bsc#1099597).\n- x86/kexec: Correct KEXEC_BACKUP_SRC_END off-by-one error (bsc#1114648).\n- x86/kvm: rename HV_X64_MSR_APIC_ASSIST_PAGE to HV_X64_MSR_VP_ASSIST_PAGE (bug#1109038).\n- x86/mm: Remove in_nmi() warning from vmalloc_fault() (bnc#1012382).\n- x86: msr-index.h: Correct SNB_C1/C3_AUTO_UNDEMOTE defines (bsc#1110006).\n- x86/numa_emulation: Fix emulated-to-physical node mapping (bnc#1012382).\n- x86/pae: use 64 bit atomic xchg function in native_ptep_get_and_clear (bnc#1012382).\n- x86/paravirt: Fix some warning messages (bnc#1065600).\n- x86/percpu: Fix this_cpu_read() (bsc#1110006).\n- x86,sched: Allow topologies where NUMA nodes share an LLC (bsc#1091158, bsc#1101555).\n- x86/spec_ctrl: Fix spec_ctrl reporting (bsc#1106913, bsc#1111516).\n- x86/speculation: Apply IBPB more strictly to avoid cross-process data leak (bsc#1106913).\n- x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation (bsc#1106913).\n- x86/speculation/l1tf: Fix up pte->pfn conversion for PAE (bnc#1012382).\n- x86/speculation: Propagate information about RSB filling mitigation to sysfs (bsc#1106913).\n- x86/time: Correct the attribute on jiffies' definition (bsc#1110006).\n- x86/tsc: Add missing header to tsc_msr.c (bnc#1012382).\n- x86/vdso: Fix asm constraints on vDSO syscall fallbacks (bsc#1110006).\n- x86/vdso: Fix vDSO build if a retpoline is emitted (bsc#1110006).\n- x86/vdso: Fix vDSO syscall fallback asm constraint regression (bsc#1110006).\n- x86/vdso: Only enable vDSO retpolines when enabled and supported (bsc#1110006).\n- xen: avoid crash in disable_hotplug_cpu (bnc#1012382 bsc#1106594 bsc#1042422).\n- xen/blkfront: correct purging of persistent grants (bnc#1065600).\n- xen: fix GCC warning and remove duplicate EVTCHN_ROW/EVTCHN_COL usage (bnc#1012382).\n- xen: issue warning message when out of grant maptrack entries (bsc#1105795).\n- xen/manage: do not complain about an empty value in control/sysrq node (bnc#1012382).\n- xen/netfront: do not bug in case of too many frags (bnc#1012382).\n- xen-netfront: fix queue name setting (bnc#1012382).\n- xen/netfront: fix waiting for xenbus state change (bnc#1012382).\n- xen-netfront: fix warn message as irq device name has '/' (bnc#1012382).\n- xen/x86/vpmu: Zero struct pt_regs before calling into sample handling code (bnc#1012382).\n- xfrm: fix 'passing zero to ERR_PTR()' warning (bnc#1012382).\n- xfs: add a new xfs_iext_lookup_extent_before helper (bsc#1095344).\n- xfs: add asserts for the mmap lock in xfs_{insert,collapse}_file_space (bsc#1095344).\n- xfs: add a xfs_bmap_fork_to_state helper (bsc#1095344).\n- xfs: add a xfs_iext_update_extent helper (bsc#1095344).\n- xfs: add comments documenting the rebalance algorithm (bsc#1095344).\n- xfs: add some comments to xfs_iext_insert/xfs_iext_insert_node (bsc#1095344).\n- xfs: add xfs_trim_extent (bsc#1095344).\n- xfs: allow unaligned extent records in xfs_bmbt_disk_set_all (bsc#1095344).\n- xfs: borrow indirect blocks from freed extent when available (bsc#1095344).\n- xfs: cleanup xfs_bmap_last_before (bsc#1095344).\n- xfs: do not create overlapping extents in xfs_bmap_add_extent_delay_real (bsc#1095344).\n- xfs: do not rely on extent indices in xfs_bmap_collapse_extents (bsc#1095344).\n- xfs: do not rely on extent indices in xfs_bmap_insert_extents (bsc#1095344).\n- xfs: do not set XFS_BTCUR_BPRV_WASDEL in xfs_bunmapi (bsc#1095344).\n- xfs: during btree split, save new block key & ptr for future insertion (bsc#1095344).\n- xfs: factor out a helper to initialize a local format inode fork (bsc#1095344).\n- xfs: fix memory leak in xfs_iext_free_last_leaf (bsc#1095344).\n- xfs: fix number of records handling in xfs_iext_split_leaf (bsc#1095344).\n- xfs: fix transaction allocation deadlock in IO path (bsc#1090535).\n- xfs: handle indlen shortage on delalloc extent merge (bsc#1095344).\n- xfs: handle zero entries case in xfs_iext_rebalance_leaf (bsc#1095344).\n- xfs: improve kmem_realloc (bsc#1095344).\n- xfs: inline xfs_shift_file_space into callers (bsc#1095344).\n- xfs: introduce the xfs_iext_cursor abstraction (bsc#1095344).\n- xfs: iterate over extents in xfs_bmap_extents_to_btree (bsc#1095344).\n- xfs: iterate over extents in xfs_iextents_copy (bsc#1095344).\n- xfs: make better use of the 'state' variable in xfs_bmap_del_extent_real (bsc#1095344).\n- xfs: merge xfs_bmap_read_extents into xfs_iread_extents (bsc#1095344).\n- xfs: move pre/post-bmap tracing into xfs_iext_update_extent (bsc#1095344).\n- xfs: move some code around inside xfs_bmap_shift_extents (bsc#1095344).\n- xfs: move some more code into xfs_bmap_del_extent_real (bsc#1095344).\n- xfs: move xfs_bmbt_irec and xfs_exntst_t to xfs_types.h (bsc#1095344).\n- xfs: move xfs_iext_insert tracepoint to report useful information (bsc#1095344).\n- xfs: new inode extent list lookup helpers (bsc#1095344).\n- xfs: only run torn log write detection on dirty logs (bsc#1095753).\n- xfs: pass an on-disk extent to xfs_bmbt_validate_extent (bsc#1095344).\n- xfs: pass a struct xfs_bmbt_irec to xfs_bmbt_lookup_eq (bsc#1095344).\n- xfs: pass a struct xfs_bmbt_irec to xfs_bmbt_update (bsc#1095344).\n- xfs: pass struct xfs_bmbt_irec to xfs_bmbt_validate_extent (bsc#1095344).\n- xfs: provide helper for counting extents from if_bytes (bsc#1095344).\n- xfs: refactor delalloc accounting in xfs_bmap_add_extent_delay_real (bsc#1095344).\n- xfs: refactor delalloc indlen reservation split into helper (bsc#1095344).\n- xfs: refactor dir2 leaf readahead shadow buffer cleverness (bsc#1095344).\n- xfs: refactor in-core log state update to helper (bsc#1095753).\n- xfs: refactor unmount record detection into helper (bsc#1095753).\n- xfs: refactor xfs_bmap_add_extent_delay_real (bsc#1095344).\n- xfs: refactor xfs_bmap_add_extent_hole_delay (bsc#1095344).\n- xfs: refactor xfs_bmap_add_extent_hole_real (bsc#1095344).\n- xfs: refactor xfs_bmap_add_extent_unwritten_real (bsc#1095344).\n- xfs: refactor xfs_bunmapi_cow (bsc#1095344).\n- xfs: refactor xfs_del_extent_real (bsc#1095344).\n- xfs: remove a duplicate assignment in xfs_bmap_add_extent_delay_real (bsc#1095344).\n- xfs: remove all xfs_bmbt_set_* helpers except for xfs_bmbt_set_all (bsc#1095344).\n- xfs: remove a superflous assignment in xfs_iext_remove_node (bsc#1095344).\n- xfs: remove if_rdev (bsc#1095344).\n- xfs: remove prev argument to xfs_bmapi_reserve_delalloc (bsc#1095344).\n- xfs: remove support for inlining data/extents into the inode fork (bsc#1095344).\n- xfs: remove the never fully implemented UUID fork format (bsc#1095344).\n- xfs: remove the nr_extents argument to xfs_iext_insert (bsc#1095344).\n- xfs: remove the nr_extents argument to xfs_iext_remove (bsc#1095344).\n- xfs: remove XFS_BMAP_MAX_SHIFT_EXTENTS (bsc#1095344).\n- xfs: remove XFS_BMAP_TRACE_EXLIST (bsc#1095344).\n- xfs: remove xfs_bmbt_get_state (bsc#1095344).\n- xfs: remove xfs_bmse_shift_one (bsc#1095344).\n- xfs: rename bno to end in __xfs_bunmapi (bsc#1095344).\n- xfs: replace xfs_bmbt_lookup_ge with xfs_bmbt_lookup_first (bsc#1095344).\n- xfs: replace xfs_qm_get_rtblks with a direct call to xfs_bmap_count_leaves (bsc#1095344).\n- xfs: rewrite getbmap using the xfs_iext_* helpers (bsc#1095344).\n- xfs: rewrite xfs_bmap_count_leaves using xfs_iext_get_extent (bsc#1095344).\n- xfs: rewrite xfs_bmap_first_unused to make better use of xfs_iext_get_extent (bsc#1095344).\n- xfs: separate log head record discovery from verification (bsc#1095753).\n- xfs: simplify the xfs_getbmap interface (bsc#1095344).\n- xfs: simplify validation of the unwritten extent bit (bsc#1095344).\n- xfs: split indlen reservations fairly when under reserved (bsc#1095344).\n- xfs: split xfs_bmap_shift_extents (bsc#1095344).\n- xfs: switch xfs_bmap_local_to_extents to use xfs_iext_insert (bsc#1095344).\n- xfs: treat idx as a cursor in xfs_bmap_add_extent_delay_real (bsc#1095344).\n- xfs: treat idx as a cursor in xfs_bmap_add_extent_hole_delay (bsc#1095344).\n- xfs: treat idx as a cursor in xfs_bmap_add_extent_hole_real (bsc#1095344).\n- xfs: treat idx as a cursor in xfs_bmap_add_extent_unwritten_real (bsc#1095344).\n- xfs: treat idx as a cursor in xfs_bmap_collapse_extents (bsc#1095344).\n- xfs: treat idx as a cursor in xfs_bmap_del_extent_* (bsc#1095344).\n- xfs: update freeblocks counter after extent deletion (bsc#1095344).\n- xfs: update got in xfs_bmap_shift_update_extent (bsc#1095344).\n- xfs: use a b+tree for the in-core extent list (bsc#1095344).\n- xfs: use correct state defines in xfs_bmap_del_extent_{cow,delay} (bsc#1095344).\n- xfs: use new extent lookup helpers in xfs_bmapi_read (bsc#1095344).\n- xfs: use new extent lookup helpers in xfs_bmapi_write (bsc#1095344).\n- xfs: use new extent lookup helpers in __xfs_bunmapi (bsc#1095344).\n- xfs: use the state defines in xfs_bmap_del_extent_real (bsc#1095344).\n- xfs: use xfs_bmap_del_extent_delay for the data fork as well (bsc#1095344).\n- xfs: use xfs_iext_*_extent helpers in xfs_bmap_shift_extents (bsc#1095344).\n- xfs: use xfs_iext_*_extent helpers in xfs_bmap_split_extent_at (bsc#1095344).\n- xfs: use xfs_iext_get_extent instead of open coding it (bsc#1095344).\n- xfs: use xfs_iext_get_extent in xfs_bmap_first_unused (bsc#1095344).\n- xhci: Add missing CAS workaround for Intel Sunrise Point xHCI (bnc#1012382).\n- xhci: Do not print a warning when setting link state for disabled ports (bnc#1012382).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-95,SUSE-SLE-SERVER-12-SP3-2019-95", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0095-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:0095-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20190095-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:0095-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html", }, { category: "self", summary: "SUSE Bug 1011920", url: "https://bugzilla.suse.com/1011920", }, { category: "self", summary: "SUSE Bug 1012382", url: "https://bugzilla.suse.com/1012382", }, { category: "self", summary: "SUSE Bug 1012422", url: "https://bugzilla.suse.com/1012422", }, { category: "self", summary: "SUSE Bug 1020645", url: "https://bugzilla.suse.com/1020645", }, { category: "self", summary: "SUSE Bug 1031392", url: "https://bugzilla.suse.com/1031392", }, { category: "self", summary: "SUSE Bug 1035053", url: "https://bugzilla.suse.com/1035053", }, { category: "self", summary: "SUSE Bug 1042422", url: "https://bugzilla.suse.com/1042422", }, { category: "self", summary: "SUSE Bug 1043591", url: "https://bugzilla.suse.com/1043591", }, { category: "self", summary: "SUSE Bug 1044189", url: "https://bugzilla.suse.com/1044189", }, { category: "self", summary: "SUSE Bug 1048129", url: "https://bugzilla.suse.com/1048129", }, { category: "self", summary: "SUSE Bug 1050431", url: "https://bugzilla.suse.com/1050431", }, { category: "self", summary: "SUSE Bug 1050549", url: "https://bugzilla.suse.com/1050549", }, { category: "self", summary: "SUSE Bug 1053043", url: "https://bugzilla.suse.com/1053043", }, { category: "self", summary: "SUSE Bug 1054239", url: "https://bugzilla.suse.com/1054239", }, { category: "self", summary: "SUSE Bug 1057199", url: "https://bugzilla.suse.com/1057199", }, { category: "self", summary: "SUSE Bug 1062303", url: "https://bugzilla.suse.com/1062303", }, { category: "self", summary: "SUSE Bug 1063026", url: "https://bugzilla.suse.com/1063026", }, { category: "self", summary: "SUSE Bug 1065600", url: "https://bugzilla.suse.com/1065600", }, { category: "self", summary: "SUSE Bug 1065726", url: "https://bugzilla.suse.com/1065726", }, { category: "self", summary: "SUSE Bug 1066223", url: "https://bugzilla.suse.com/1066223", }, { category: "self", summary: "SUSE Bug 1067906", url: "https://bugzilla.suse.com/1067906", }, { category: "self", summary: "SUSE Bug 1073579", url: "https://bugzilla.suse.com/1073579", }, { category: "self", summary: "SUSE Bug 1076393", url: "https://bugzilla.suse.com/1076393", }, { category: "self", summary: "SUSE Bug 1078788", url: "https://bugzilla.suse.com/1078788", }, { category: "self", summary: "SUSE Bug 1079524", url: "https://bugzilla.suse.com/1079524", }, { category: "self", summary: "SUSE Bug 1082519", url: "https://bugzilla.suse.com/1082519", }, { category: "self", summary: "SUSE Bug 1082863", url: "https://bugzilla.suse.com/1082863", }, { category: "self", summary: "SUSE Bug 1082979", url: "https://bugzilla.suse.com/1082979", }, { category: "self", summary: "SUSE Bug 1083215", url: "https://bugzilla.suse.com/1083215", }, { category: "self", summary: "SUSE Bug 1083527", url: "https://bugzilla.suse.com/1083527", }, { category: "self", summary: "SUSE Bug 1084427", url: "https://bugzilla.suse.com/1084427", }, { category: "self", summary: "SUSE Bug 1084536", url: "https://bugzilla.suse.com/1084536", }, { category: "self", summary: "SUSE Bug 1084760", url: "https://bugzilla.suse.com/1084760", }, { category: "self", summary: "SUSE Bug 1087209", url: "https://bugzilla.suse.com/1087209", }, { category: "self", summary: "SUSE Bug 1088087", url: "https://bugzilla.suse.com/1088087", }, { category: "self", summary: "SUSE Bug 1089343", url: "https://bugzilla.suse.com/1089343", }, { category: "self", summary: "SUSE Bug 1090535", url: "https://bugzilla.suse.com/1090535", }, { category: "self", summary: "SUSE Bug 1091158", url: "https://bugzilla.suse.com/1091158", }, { category: "self", summary: "SUSE Bug 1093118", url: "https://bugzilla.suse.com/1093118", }, { category: "self", summary: "SUSE Bug 1094244", url: "https://bugzilla.suse.com/1094244", }, { category: "self", summary: "SUSE Bug 1094555", url: "https://bugzilla.suse.com/1094555", }, { category: "self", summary: "SUSE Bug 1094562", url: "https://bugzilla.suse.com/1094562", }, { category: "self", summary: "SUSE Bug 1094825", url: "https://bugzilla.suse.com/1094825", }, { category: "self", summary: "SUSE Bug 1095344", url: "https://bugzilla.suse.com/1095344", }, { category: "self", summary: "SUSE Bug 1095753", url: "https://bugzilla.suse.com/1095753", }, { category: "self", summary: "SUSE Bug 1095805", url: "https://bugzilla.suse.com/1095805", }, { category: "self", summary: "SUSE Bug 1096052", url: "https://bugzilla.suse.com/1096052", }, { category: "self", summary: "SUSE Bug 1096547", url: "https://bugzilla.suse.com/1096547", }, { category: "self", summary: "SUSE Bug 1098050", url: "https://bugzilla.suse.com/1098050", }, { category: "self", summary: "SUSE Bug 1098996", url: "https://bugzilla.suse.com/1098996", }, { category: "self", summary: "SUSE Bug 1099597", url: "https://bugzilla.suse.com/1099597", }, { category: "self", summary: "SUSE Bug 1099810", url: "https://bugzilla.suse.com/1099810", }, { category: "self", summary: "SUSE Bug 1101555", url: "https://bugzilla.suse.com/1101555", }, { category: "self", summary: "SUSE Bug 1102495", url: "https://bugzilla.suse.com/1102495", }, { category: "self", summary: "SUSE Bug 1102715", url: "https://bugzilla.suse.com/1102715", }, { category: "self", summary: "SUSE Bug 1102870", url: "https://bugzilla.suse.com/1102870", }, { category: "self", summary: "SUSE Bug 1102875", url: "https://bugzilla.suse.com/1102875", }, { category: "self", summary: "SUSE Bug 1102877", url: "https://bugzilla.suse.com/1102877", }, { category: "self", summary: "SUSE Bug 1102879", url: "https://bugzilla.suse.com/1102879", }, { category: "self", summary: "SUSE Bug 1102882", url: "https://bugzilla.suse.com/1102882", }, { category: "self", summary: "SUSE Bug 1102896", url: "https://bugzilla.suse.com/1102896", }, { category: "self", summary: "SUSE Bug 1103156", url: "https://bugzilla.suse.com/1103156", }, { category: "self", summary: "SUSE Bug 1103269", url: "https://bugzilla.suse.com/1103269", }, { category: "self", summary: "SUSE Bug 1103308", url: "https://bugzilla.suse.com/1103308", }, { category: "self", summary: "SUSE Bug 1103405", url: "https://bugzilla.suse.com/1103405", }, { category: "self", summary: "SUSE Bug 1104124", url: "https://bugzilla.suse.com/1104124", }, { category: "self", summary: "SUSE Bug 1105025", url: "https://bugzilla.suse.com/1105025", }, { category: "self", summary: "SUSE Bug 1105428", url: "https://bugzilla.suse.com/1105428", }, { category: "self", summary: "SUSE Bug 1105795", url: "https://bugzilla.suse.com/1105795", }, { category: "self", summary: "SUSE Bug 1105931", url: "https://bugzilla.suse.com/1105931", }, { category: "self", summary: "SUSE Bug 1106095", url: "https://bugzilla.suse.com/1106095", }, { category: "self", summary: "SUSE Bug 1106105", url: "https://bugzilla.suse.com/1106105", }, { category: "self", summary: "SUSE Bug 1106110", url: "https://bugzilla.suse.com/1106110", }, { category: "self", summary: "SUSE Bug 1106240", url: "https://bugzilla.suse.com/1106240", }, { category: "self", summary: "SUSE Bug 1106293", url: "https://bugzilla.suse.com/1106293", }, { category: "self", summary: "SUSE Bug 1106359", url: "https://bugzilla.suse.com/1106359", }, { category: "self", summary: "SUSE Bug 1106434", url: "https://bugzilla.suse.com/1106434", }, { category: "self", summary: "SUSE Bug 1106512", url: "https://bugzilla.suse.com/1106512", }, { category: "self", summary: "SUSE Bug 1106594", url: "https://bugzilla.suse.com/1106594", }, { category: "self", summary: "SUSE Bug 1106913", url: "https://bugzilla.suse.com/1106913", }, { category: "self", summary: "SUSE Bug 1106929", url: "https://bugzilla.suse.com/1106929", }, { category: "self", summary: "SUSE Bug 1106934", url: "https://bugzilla.suse.com/1106934", }, { category: "self", summary: "SUSE Bug 1107060", url: "https://bugzilla.suse.com/1107060", }, { category: "self", summary: "SUSE Bug 1107299", url: "https://bugzilla.suse.com/1107299", }, { category: "self", summary: "SUSE Bug 1107318", url: "https://bugzilla.suse.com/1107318", }, { category: "self", summary: "SUSE Bug 1107535", url: "https://bugzilla.suse.com/1107535", }, { category: "self", summary: "SUSE Bug 1107829", url: "https://bugzilla.suse.com/1107829", }, { category: "self", summary: "SUSE Bug 1107870", url: "https://bugzilla.suse.com/1107870", }, { category: "self", summary: "SUSE Bug 1107924", url: "https://bugzilla.suse.com/1107924", }, { category: "self", summary: "SUSE Bug 1108096", url: "https://bugzilla.suse.com/1108096", }, { category: "self", summary: "SUSE Bug 1108170", url: "https://bugzilla.suse.com/1108170", }, { category: "self", summary: "SUSE Bug 1108240", url: "https://bugzilla.suse.com/1108240", }, { category: "self", summary: "SUSE Bug 1108281", url: "https://bugzilla.suse.com/1108281", }, { category: "self", summary: "SUSE Bug 1108315", url: "https://bugzilla.suse.com/1108315", }, { category: "self", summary: "SUSE Bug 1108377", url: "https://bugzilla.suse.com/1108377", }, { category: "self", summary: "SUSE Bug 1108399", url: "https://bugzilla.suse.com/1108399", }, { category: "self", summary: "SUSE Bug 1108498", url: "https://bugzilla.suse.com/1108498", }, { category: "self", summary: "SUSE Bug 1108803", url: "https://bugzilla.suse.com/1108803", }, { category: "self", summary: "SUSE Bug 1108823", url: "https://bugzilla.suse.com/1108823", }, { category: "self", summary: "SUSE Bug 1109038", url: "https://bugzilla.suse.com/1109038", }, { category: "self", summary: "SUSE Bug 1109158", url: "https://bugzilla.suse.com/1109158", }, { category: "self", summary: "SUSE Bug 1109333", url: "https://bugzilla.suse.com/1109333", }, { category: "self", summary: "SUSE Bug 1109336", url: "https://bugzilla.suse.com/1109336", }, { category: "self", summary: "SUSE Bug 1109337", url: "https://bugzilla.suse.com/1109337", }, { category: "self", summary: "SUSE Bug 1109441", url: "https://bugzilla.suse.com/1109441", }, { category: "self", summary: "SUSE Bug 1109772", url: "https://bugzilla.suse.com/1109772", }, { category: "self", summary: "SUSE Bug 1109784", url: "https://bugzilla.suse.com/1109784", }, { category: "self", summary: "SUSE Bug 1109806", url: "https://bugzilla.suse.com/1109806", }, { category: "self", summary: "SUSE Bug 1109818", url: "https://bugzilla.suse.com/1109818", }, { category: "self", summary: "SUSE Bug 1109907", url: "https://bugzilla.suse.com/1109907", }, { category: "self", summary: "SUSE Bug 1109919", url: "https://bugzilla.suse.com/1109919", }, { category: "self", summary: "SUSE Bug 1109923", url: "https://bugzilla.suse.com/1109923", }, { category: "self", summary: "SUSE Bug 1110006", url: "https://bugzilla.suse.com/1110006", }, { category: "self", summary: "SUSE Bug 1110297", url: "https://bugzilla.suse.com/1110297", }, { category: "self", summary: "SUSE Bug 1110337", url: "https://bugzilla.suse.com/1110337", }, { category: "self", summary: "SUSE Bug 1110363", url: "https://bugzilla.suse.com/1110363", }, { category: "self", summary: "SUSE Bug 1110468", url: "https://bugzilla.suse.com/1110468", }, { category: "self", summary: "SUSE Bug 1110600", url: "https://bugzilla.suse.com/1110600", }, { category: "self", summary: "SUSE Bug 1110601", url: "https://bugzilla.suse.com/1110601", }, { category: "self", summary: "SUSE Bug 1110602", url: "https://bugzilla.suse.com/1110602", }, { category: "self", summary: "SUSE Bug 1110603", url: "https://bugzilla.suse.com/1110603", }, { category: "self", summary: "SUSE Bug 1110604", url: "https://bugzilla.suse.com/1110604", }, { category: "self", summary: "SUSE Bug 1110605", url: "https://bugzilla.suse.com/1110605", }, { category: "self", summary: "SUSE Bug 1110606", url: "https://bugzilla.suse.com/1110606", }, { category: "self", summary: "SUSE Bug 1110611", url: "https://bugzilla.suse.com/1110611", }, { category: "self", summary: "SUSE Bug 1110612", url: "https://bugzilla.suse.com/1110612", }, { category: "self", summary: "SUSE Bug 1110613", url: "https://bugzilla.suse.com/1110613", }, { category: "self", summary: "SUSE Bug 1110614", url: "https://bugzilla.suse.com/1110614", }, { category: "self", summary: "SUSE Bug 1110615", url: "https://bugzilla.suse.com/1110615", }, { category: "self", summary: "SUSE Bug 1110616", url: "https://bugzilla.suse.com/1110616", }, { category: "self", summary: "SUSE Bug 1110618", url: "https://bugzilla.suse.com/1110618", }, { category: "self", summary: "SUSE Bug 1110619", url: "https://bugzilla.suse.com/1110619", }, { category: "self", summary: "SUSE Bug 1110930", url: "https://bugzilla.suse.com/1110930", }, { category: "self", summary: "SUSE Bug 1111363", url: "https://bugzilla.suse.com/1111363", }, { category: "self", summary: "SUSE Bug 1111516", url: "https://bugzilla.suse.com/1111516", }, { category: "self", summary: "SUSE Bug 1111870", url: "https://bugzilla.suse.com/1111870", }, { category: "self", summary: "SUSE Bug 1112007", url: "https://bugzilla.suse.com/1112007", }, { category: "self", summary: "SUSE Bug 1112262", url: "https://bugzilla.suse.com/1112262", }, { category: "self", summary: "SUSE Bug 1112263", url: "https://bugzilla.suse.com/1112263", }, { category: "self", summary: "SUSE Bug 1112894", url: "https://bugzilla.suse.com/1112894", }, { category: "self", summary: "SUSE Bug 1112902", url: "https://bugzilla.suse.com/1112902", }, { category: "self", summary: "SUSE Bug 1112903", url: "https://bugzilla.suse.com/1112903", }, { category: "self", summary: "SUSE Bug 1112905", url: "https://bugzilla.suse.com/1112905", }, { category: "self", summary: "SUSE Bug 1113667", url: "https://bugzilla.suse.com/1113667", }, { category: "self", summary: "SUSE Bug 1113751", url: "https://bugzilla.suse.com/1113751", }, { category: "self", summary: "SUSE Bug 1113766", url: "https://bugzilla.suse.com/1113766", }, { category: "self", summary: "SUSE Bug 1113769", url: "https://bugzilla.suse.com/1113769", }, { category: "self", summary: "SUSE Bug 1114178", url: "https://bugzilla.suse.com/1114178", }, { category: "self", summary: "SUSE Bug 1114229", url: "https://bugzilla.suse.com/1114229", }, { category: "self", summary: "SUSE Bug 1114648", url: "https://bugzilla.suse.com/1114648", }, { category: "self", summary: "SUSE Bug 1115593", url: "https://bugzilla.suse.com/1115593", }, { category: "self", summary: "SUSE Bug 981083", url: "https://bugzilla.suse.com/981083", }, { category: "self", summary: "SUSE Bug 997172", url: "https://bugzilla.suse.com/997172", }, { category: "self", summary: "SUSE CVE CVE-2018-14613 page", url: "https://www.suse.com/security/cve/CVE-2018-14613/", }, { category: "self", summary: "SUSE CVE CVE-2018-14617 page", url: "https://www.suse.com/security/cve/CVE-2018-14617/", }, { category: "self", summary: "SUSE CVE CVE-2018-14633 page", url: "https://www.suse.com/security/cve/CVE-2018-14633/", }, { category: "self", summary: "SUSE CVE CVE-2018-16276 page", url: "https://www.suse.com/security/cve/CVE-2018-16276/", }, { category: "self", summary: "SUSE CVE CVE-2018-16597 page", url: "https://www.suse.com/security/cve/CVE-2018-16597/", }, { category: "self", summary: "SUSE CVE CVE-2018-17182 page", url: "https://www.suse.com/security/cve/CVE-2018-17182/", }, { category: "self", summary: "SUSE CVE CVE-2018-18281 page", url: "https://www.suse.com/security/cve/CVE-2018-18281/", }, { category: "self", summary: "SUSE CVE CVE-2018-18386 page", url: "https://www.suse.com/security/cve/CVE-2018-18386/", }, { category: "self", summary: "SUSE CVE CVE-2018-18690 page", url: "https://www.suse.com/security/cve/CVE-2018-18690/", }, { category: "self", summary: "SUSE CVE CVE-2018-18710 page", url: "https://www.suse.com/security/cve/CVE-2018-18710/", }, { category: "self", summary: "SUSE CVE CVE-2018-7480 page", url: "https://www.suse.com/security/cve/CVE-2018-7480/", }, { category: "self", summary: "SUSE CVE CVE-2018-7757 page", url: "https://www.suse.com/security/cve/CVE-2018-7757/", }, { category: "self", summary: "SUSE CVE CVE-2018-9516 page", url: "https://www.suse.com/security/cve/CVE-2018-9516/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2019-01-15T13:58:45Z", generator: { date: "2019-01-15T13:58:45Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:0095-1", initial_release_date: "2019-01-15T13:58:45Z", revision_history: [ { date: "2019-01-15T13:58:45Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-azure-4.4.162-4.19.1.noarch", product: { name: "kernel-devel-azure-4.4.162-4.19.1.noarch", product_id: "kernel-devel-azure-4.4.162-4.19.1.noarch", }, }, { category: "product_version", name: "kernel-source-azure-4.4.162-4.19.1.noarch", product: { name: "kernel-source-azure-4.4.162-4.19.1.noarch", product_id: "kernel-source-azure-4.4.162-4.19.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-4.4.162-4.19.2.x86_64", product: { name: "cluster-md-kmp-azure-4.4.162-4.19.2.x86_64", product_id: "cluster-md-kmp-azure-4.4.162-4.19.2.x86_64", }, }, { category: "product_version", name: "dlm-kmp-azure-4.4.162-4.19.2.x86_64", product: { name: "dlm-kmp-azure-4.4.162-4.19.2.x86_64", product_id: "dlm-kmp-azure-4.4.162-4.19.2.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-azure-4.4.162-4.19.2.x86_64", product: { name: "gfs2-kmp-azure-4.4.162-4.19.2.x86_64", product_id: "gfs2-kmp-azure-4.4.162-4.19.2.x86_64", }, }, { category: "product_version", name: "kernel-azure-4.4.162-4.19.2.x86_64", product: { name: "kernel-azure-4.4.162-4.19.2.x86_64", product_id: "kernel-azure-4.4.162-4.19.2.x86_64", }, }, { category: "product_version", name: "kernel-azure-base-4.4.162-4.19.2.x86_64", product: { name: "kernel-azure-base-4.4.162-4.19.2.x86_64", product_id: "kernel-azure-base-4.4.162-4.19.2.x86_64", }, }, { category: "product_version", name: "kernel-azure-devel-4.4.162-4.19.2.x86_64", product: { name: "kernel-azure-devel-4.4.162-4.19.2.x86_64", product_id: "kernel-azure-devel-4.4.162-4.19.2.x86_64", }, }, { category: "product_version", name: "kernel-azure-extra-4.4.162-4.19.2.x86_64", product: { name: "kernel-azure-extra-4.4.162-4.19.2.x86_64", product_id: "kernel-azure-extra-4.4.162-4.19.2.x86_64", }, }, { category: "product_version", name: "kernel-azure-kgraft-4.4.162-4.19.2.x86_64", product: { name: "kernel-azure-kgraft-4.4.162-4.19.2.x86_64", product_id: "kernel-azure-kgraft-4.4.162-4.19.2.x86_64", }, }, { category: "product_version", name: "kernel-syms-azure-4.4.162-4.19.1.x86_64", product: { name: "kernel-syms-azure-4.4.162-4.19.1.x86_64", product_id: "kernel-syms-azure-4.4.162-4.19.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-azure-4.4.162-4.19.2.x86_64", product: { name: "kselftests-kmp-azure-4.4.162-4.19.2.x86_64", product_id: "kselftests-kmp-azure-4.4.162-4.19.2.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-4.4.162-4.19.2.x86_64", product: { name: "ocfs2-kmp-azure-4.4.162-4.19.2.x86_64", product_id: "ocfs2-kmp-azure-4.4.162-4.19.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3", product: { name: "SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-azure-4.4.162-4.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", }, product_reference: "kernel-azure-4.4.162-4.19.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-base-4.4.162-4.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", }, product_reference: "kernel-azure-base-4.4.162-4.19.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-4.4.162-4.19.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", }, product_reference: "kernel-azure-devel-4.4.162-4.19.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-4.4.162-4.19.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", }, product_reference: "kernel-devel-azure-4.4.162-4.19.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-4.4.162-4.19.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", }, product_reference: "kernel-source-azure-4.4.162-4.19.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-4.4.162-4.19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", }, product_reference: "kernel-syms-azure-4.4.162-4.19.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-4.4.162-4.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", }, product_reference: "kernel-azure-4.4.162-4.19.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-base-4.4.162-4.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", }, product_reference: "kernel-azure-base-4.4.162-4.19.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-4.4.162-4.19.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", }, product_reference: "kernel-azure-devel-4.4.162-4.19.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-4.4.162-4.19.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", }, product_reference: "kernel-devel-azure-4.4.162-4.19.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-4.4.162-4.19.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", }, product_reference: "kernel-source-azure-4.4.162-4.19.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-4.4.162-4.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", }, product_reference: "kernel-syms-azure-4.4.162-4.19.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, ], }, vulnerabilities: [ { cve: "CVE-2018-14613", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14613", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in io_ctl_map_page() when mounting and operating a crafted btrfs image, because of a lack of block group item validation in check_leaf_item in fs/btrfs/tree-checker.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14613", url: "https://www.suse.com/security/cve/CVE-2018-14613", }, { category: "external", summary: "SUSE Bug 1102896 for CVE-2018-14613", url: "https://bugzilla.suse.com/1102896", }, { category: "external", summary: "SUSE Bug 1103800 for CVE-2018-14613", url: "https://bugzilla.suse.com/1103800", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-15T13:58:45Z", details: "moderate", }, ], title: "CVE-2018-14613", }, { cve: "CVE-2018-14617", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14617", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.17.10. There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14617", url: "https://www.suse.com/security/cve/CVE-2018-14617", }, { category: "external", summary: "SUSE Bug 1102870 for CVE-2018-14617", url: "https://bugzilla.suse.com/1102870", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-15T13:58:45Z", details: "moderate", }, ], title: "CVE-2018-14617", }, { cve: "CVE-2018-14633", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14633", }, ], notes: [ { category: "general", text: "A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14633", url: "https://www.suse.com/security/cve/CVE-2018-14633", }, { category: "external", summary: "SUSE Bug 1107829 for CVE-2018-14633", url: "https://bugzilla.suse.com/1107829", }, { category: "external", summary: "SUSE Bug 1107832 for CVE-2018-14633", url: "https://bugzilla.suse.com/1107832", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-15T13:58:45Z", details: "important", }, ], title: "CVE-2018-14633", }, { cve: "CVE-2018-16276", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16276", }, ], notes: [ { category: "general", text: "An issue was discovered in yurex_read in drivers/usb/misc/yurex.c in the Linux kernel before 4.17.7. Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16276", url: "https://www.suse.com/security/cve/CVE-2018-16276", }, { category: "external", summary: "SUSE Bug 1106095 for CVE-2018-16276", url: "https://bugzilla.suse.com/1106095", }, { category: "external", summary: "SUSE Bug 1115593 for CVE-2018-16276", url: "https://bugzilla.suse.com/1115593", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-15T13:58:45Z", details: "important", }, ], title: "CVE-2018-16276", }, { cve: "CVE-2018-16597", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16597", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 4.8. Incorrect access checking in overlayfs mounts could be used by local attackers to modify or truncate files in the underlying filesystem.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16597", url: "https://www.suse.com/security/cve/CVE-2018-16597", }, { category: "external", summary: "SUSE Bug 1106512 for CVE-2018-16597", url: "https://bugzilla.suse.com/1106512", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-15T13:58:45Z", details: "moderate", }, ], title: "CVE-2018-16597", }, { cve: "CVE-2018-17182", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17182", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_all function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17182", url: "https://www.suse.com/security/cve/CVE-2018-17182", }, { category: "external", summary: "SUSE Bug 1108399 for CVE-2018-17182", url: "https://bugzilla.suse.com/1108399", }, { category: "external", summary: "SUSE Bug 1110233 for CVE-2018-17182", url: "https://bugzilla.suse.com/1110233", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-15T13:58:45Z", details: "moderate", }, ], title: "CVE-2018-17182", }, { cve: "CVE-2018-18281", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18281", }, ], notes: [ { category: "general", text: "Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. This is fixed in the following kernel versions: 4.9.135, 4.14.78, 4.18.16, 4.19.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18281", url: "https://www.suse.com/security/cve/CVE-2018-18281", }, { category: "external", summary: "SUSE Bug 1113769 for CVE-2018-18281", url: "https://bugzilla.suse.com/1113769", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-15T13:58:45Z", details: "moderate", }, ], title: "CVE-2018-18281", }, { cve: "CVE-2018-18386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18386", }, ], notes: [ { category: "general", text: "drivers/tty/n_tty.c in the Linux kernel before 4.14.11 allows local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18386", url: "https://www.suse.com/security/cve/CVE-2018-18386", }, { category: "external", summary: "SUSE Bug 1094825 for CVE-2018-18386", url: "https://bugzilla.suse.com/1094825", }, { category: "external", summary: "SUSE Bug 1112039 for CVE-2018-18386", url: "https://bugzilla.suse.com/1112039", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-15T13:58:45Z", details: "moderate", }, ], title: "CVE-2018-18386", }, { cve: "CVE-2018-18690", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18690", }, ], notes: [ { category: "general", text: "In the Linux kernel before 4.17, a local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandles ATTR_REPLACE operations with conversion of an attr from short to long form.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18690", url: "https://www.suse.com/security/cve/CVE-2018-18690", }, { category: "external", summary: "SUSE Bug 1105025 for CVE-2018-18690", url: "https://bugzilla.suse.com/1105025", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-15T13:58:45Z", details: "moderate", }, ], title: "CVE-2018-18690", }, { cve: "CVE-2018-18710", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18710", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18710", url: "https://www.suse.com/security/cve/CVE-2018-18710", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-18710", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-15T13:58:45Z", details: "moderate", }, ], title: "CVE-2018-18710", }, { cve: "CVE-2018-7480", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7480", }, ], notes: [ { category: "general", text: "The blkcg_init_queue function in block/blk-cgroup.c in the Linux kernel before 4.11 allows local users to cause a denial of service (double free) or possibly have unspecified other impact by triggering a creation failure.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7480", url: "https://www.suse.com/security/cve/CVE-2018-7480", }, { category: "external", summary: "SUSE Bug 1082863 for CVE-2018-7480", url: "https://bugzilla.suse.com/1082863", }, { category: "external", summary: "SUSE Bug 1084536 for CVE-2018-7480", url: "https://bugzilla.suse.com/1084536", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-15T13:58:45Z", details: "moderate", }, ], title: "CVE-2018-7480", }, { cve: "CVE-2018-7757", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7757", }, ], notes: [ { category: "general", text: "Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7757", url: "https://www.suse.com/security/cve/CVE-2018-7757", }, { category: "external", summary: "SUSE Bug 1084536 for CVE-2018-7757", url: "https://bugzilla.suse.com/1084536", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-7757", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1087209 for CVE-2018-7757", url: "https://bugzilla.suse.com/1087209", }, { category: "external", summary: "SUSE Bug 1091815 for CVE-2018-7757", url: "https://bugzilla.suse.com/1091815", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-15T13:58:45Z", details: "moderate", }, ], title: "CVE-2018-7757", }, { cve: "CVE-2018-9516", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-9516", }, ], notes: [ { category: "general", text: "In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-71361580.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-9516", url: "https://www.suse.com/security/cve/CVE-2018-9516", }, { category: "external", summary: "SUSE Bug 1108498 for CVE-2018-9516", url: "https://bugzilla.suse.com/1108498", }, { category: "external", summary: "SUSE Bug 1123161 for CVE-2018-9516", url: "https://bugzilla.suse.com/1123161", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.162-4.19.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.162-4.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.162-4.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-15T13:58:45Z", details: "moderate", }, ], title: "CVE-2018-9516", }, ], }
suse-su-2018:3688-1
Vulnerability from csaf_suse
Published
2018-11-09 16:00
Modified
2018-11-09 16:00
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.162 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bnc#1107829).
- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).
- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).
- CVE-2018-18690: A local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE operations with conversion of an attr from short to long form (bnc#1105025).
- CVE-2018-18710: An issue was discovered in the Linux kernel An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).
- CVE-2018-9516: A lack of certain checks in the hid_debug_events_read() function in the drivers/hid/hid-debug.c file might have resulted in receiving userspace buffer overflow and an out-of-bounds write or to the infinite loop. (bnc#1108498).
The following non-security bugs were fixed:
- 6lowpan: iphc: reset mac_header after decompress to fix panic (bnc#1012382).
- alsa: bebob: use address returned by kmalloc() instead of kernel stack for streaming DMA mapping (bnc#1012382).
- alsa: emu10k1: fix possible info leak to userspace on SNDRV_EMU10K1_IOCTL_INFO (bnc#1012382).
- alsa: hda: Add AZX_DCAPS_PM_RUNTIME for AMD Raven Ridge (bnc#1012382).
- alsa: hda - Fix cancel_work_sync() stall from jackpoll work (bnc#1012382).
- alsa: hda/realtek - Cannot adjust speaker's volume on Dell XPS 27 7760 (bnc#1012382).
- alsa: msnd: Fix the default sample sizes (bnc#1012382).
- alsa: pcm: Fix snd_interval_refine first/last with open min/max (bnc#1012382).
- alsa: usb-audio: Fix multiple definitions in AU0828_DEVICE() macro (bnc#1012382).
- apparmor: remove no-op permission check in policy_unpack (git-fixes).
- arc: build: Get rid of toolchain check (bnc#1012382).
- arc: clone syscall to setp r25 as thread pointer (bnc#1012382).
- arch/hexagon: fix kernel/dma.c build warning (bnc#1012382).
- arc: [plat-axs*]: Enable SWAP (bnc#1012382).
- arm64: bpf: jit JMP_JSET_{X,K} (bsc#1110613).
- arm64: Correct type for PUD macros (bsc#1110600).
- arm64: cpufeature: Track 32bit EL0 support (bnc#1012382).
- arm64: dts: qcom: db410c: Fix Bluetooth LED trigger (bnc#1012382).
- arm64: fix erroneous __raw_read_system_reg() cases (bsc#1110606).
- arm64: Fix potential race with hardware DBM in ptep_set_access_flags() (bsc#1110605).
- arm64: fpsimd: Avoid FPSIMD context leakage for the init task (bsc#1110603).
- arm64: jump_label.h: use asm_volatile_goto macro instead of 'asm goto' (bnc#1012382).
- arm64: kasan: avoid bad virt_to_pfn() (bsc#1110612).
- arm64: kasan: avoid pfn_to_nid() before page array is initialized (bsc#1110619).
- arm64/kasan: do not allocate extra shadow memory (bsc#1110611).
- arm64: kernel: Update kerneldoc for cpu_suspend() rename (bsc#1110602).
- arm64: kgdb: handle read-only text / modules (bsc#1110604).
- arm64: kvm: Sanitize PSTATE.M when being set from userspace (bnc#1012382).
- arm64: kvm: Tighten guest core register access from userspace (bnc#1012382).
- arm64/mm/kasan: do not use vmemmap_populate() to initialize shadow (bsc#1110618).
- arm64: ptrace: Avoid setting compat FP[SC]R to garbage if get_user fails (bsc#1110601).
- arm64: supported.conf: mark armmmci as not supported
- arm64 Update config files. (bsc#1110468) Set MMC_QCOM_DML to build-in and delete driver from supported.conf
- arm64: vdso: fix clock_getres for 4GiB-aligned res (bsc#1110614).
- arm: dts: at91: add new compatibility string for macb on sama5d3 (bnc#1012382).
- arm: dts: dra7: fix DCAN node addresses (bnc#1012382).
- arm: exynos: Clear global variable on init error path (bnc#1012382).
- arm: hisi: check of_iomap and fix missing of_node_put (bnc#1012382).
- arm: hisi: fix error handling and missing of_node_put (bnc#1012382).
- arm: hisi: handle of_iomap and fix missing of_node_put (bnc#1012382).
- arm: mvebu: declare asm symbols as character arrays in pmsu.c (bnc#1012382).
- ASoC: cs4265: fix MMTLR Data switch control (bnc#1012382).
- ASoC: dapm: Fix potential DAI widget pointer deref when linking DAIs (bnc#1012382).
- ASoC: sigmadsp: safeload should not have lower byte limit (bnc#1012382).
- ASoC: wm8804: Add ACPI support (bnc#1012382).
- ata: libahci: Correct setting of DEVSLP register (bnc#1012382).
- ath10k: disable bundle mgmt tx completion event support (bnc#1012382).
- ath10k: fix scan crash due to incorrect length calculation (bnc#1012382).
- ath10k: fix use-after-free in ath10k_wmi_cmd_send_nowait (bnc#1012382).
- ath10k: prevent active scans on potential unusable channels (bnc#1012382).
- ath10k: protect ath10k_htt_rx_ring_free with rx_ring.lock (bnc#1012382).
- audit: fix use-after-free in audit_add_watch (bnc#1012382).
- autofs: fix autofs_sbi() does not check super block type (bnc#1012382).
- binfmt_elf: Respect error return from `regset->active' (bnc#1012382).
- bluetooth: Add a new Realtek 8723DE ID 0bda:b009 (bnc#1012382).
- bluetooth: h5: Fix missing dependency on BT_HCIUART_SERDEV (bnc#1012382).
- bluetooth: hidp: Fix handling of strncpy for hid->name information (bnc#1012382).
- bnxt_en: Fix TX timeout during netpoll (bnc#1012382).
- bonding: avoid possible dead-lock (bnc#1012382).
- bpf: fix cb access in socket filter programs on tail calls (bsc#1012382).
- bpf: fix map not being uncharged during map creation failure (bsc#1012382).
- bpf, s390: fix potential memleak when later bpf_jit_prog fails (git-fixes).
- bpf, s390x: do not reload skb pointers in non-skb context (git-fixes).
- bsc#1106913: Replace with upstream variants
- btrfs: add a comp_refs() helper (dependency for bsc#1031392).
- btrfs: add missing initialization in btrfs_check_shared (Git-fixes bsc#1112262).
- btrfs: add tracepoints for outstanding extents mods (dependency for bsc#1031392).
- btrfs: add wrapper for counting BTRFS_MAX_EXTENT_SIZE (dependency for bsc#1031392).
- btrfs: cleanup extent locking sequence (dependency for bsc#1031392).
- btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag (Follow up fixes for bsc#1031392).
- btrfs: delayed-inode: Remove wrong qgroup meta reservation calls (bsc#1031392).
- btrfs: delayed-inode: Use new qgroup meta rsv for delayed inode and item (bsc#1031392).
- btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667).
- btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).
- btrfs: fix error handling in btrfs_dev_replace_start (bsc#1107535).
- btrfs: fix invalid attempt to free reserved space on failure to cow range (dependency for bsc#1031392).
- btrfs: fix missing error return in btrfs_drop_snapshot (Git-fixes bsc#1109919).
- btrfs: Fix race condition between delayed refs and blockgroup removal (Git-fixes bsc#1112263).
- btrfs: Fix wrong btrfs_delalloc_release_extents parameter (bsc#1031392).
- btrfs: kill trans in run_delalloc_nocow and btrfs_cross_ref_exist (dependency for bsc#1031392).
- btrfs: make the delalloc block rsv per inode (dependency for bsc#1031392).
- btrfs: pass delayed_refs directly to btrfs_find_delayed_ref_head (dependency for bsc#1031392).
- btrfs: qgroup: Add quick exit for non-fs extents (dependency for bsc#1031392).
- btrfs: qgroup: Cleanup btrfs_qgroup_prepare_account_extents function (dependency for bsc#1031392).
- btrfs: qgroup: Cleanup the remaining old reservation counters (bsc#1031392).
- btrfs: qgroup: Commit transaction in advance to reduce early EDQUOT (bsc#1031392).
- btrfs: qgroup: Do not use root->qgroup_meta_rsv for qgroup (bsc#1031392).
- btrfs: qgroup: Fix wrong qgroup reservation update for relationship modification (bsc#1031392).
- btrfs: qgroup: Introduce function to convert META_PREALLOC into META_PERTRANS (bsc#1031392).
- btrfs: qgroup: Introduce helpers to update and access new qgroup rsv (bsc#1031392).
- btrfs: qgroup: Make qgroup_reserve and its callers to use separate reservation type (bsc#1031392).
- btrfs: qgroup: Skeleton to support separate qgroup reservation type (bsc#1031392).
- btrfs: qgroups: opencode qgroup_free helper (dependency for bsc#1031392).
- btrfs: qgroup: Split meta rsv type into meta_prealloc and meta_pertrans (bsc#1031392).
- btrfs: qgroup: Update trace events for metadata reservation (bsc#1031392).
- btrfs: qgroup: Update trace events to use new separate rsv types (bsc#1031392).
- btrfs: qgroup: Use independent and accurate per inode qgroup rsv (bsc#1031392).
- btrfs: qgroup: Use root::qgroup_meta_rsv_* to record qgroup meta reserved space (bsc#1031392).
- btrfs: qgroup: Use separate meta reservation type for delalloc (bsc#1031392).
- btrfs: remove type argument from comp_tree_refs (dependency for bsc#1031392).
- btrfs: rework outstanding_extents (dependency for bsc#1031392).
- btrfs: switch args for comp_*_refs (dependency for bsc#1031392).
- btrfs: Take trans lock before access running trans in check_delayed_ref (Follow up fixes for bsc#1031392).
- ceph: avoid a use-after-free in ceph_destroy_options() (bsc#1112007).
- cfg80211: fix a type issue in ieee80211_chandef_to_operating_class() (bnc#1012382).
- cfg80211: nl80211_update_ft_ies() to validate NL80211_ATTR_IE (bnc#1012382).
- cfq: Give a chance for arming slice idle timer in case of group_idle (bnc#1012382).
- cgroup: Fix deadlock in cpu hotplug path (bnc#1012382).
- cgroup, netclassid: add a preemption point to write_classid (bnc#1098996).
- cifs: check for STATUS_USER_SESSION_DELETED (bsc#1112902).
- cifs: connect to servername instead of IP for IPC$ share (bsc#1106359).
- cifs: fix memory leak in SMB2_open() (bsc#1112894).
- cifs: Fix use after free of a mid_q_entry (bsc#1112903).
- cifs: fix wrapping bugs in num_entries() (bnc#1012382).
- cifs: integer overflow in in SMB2_ioctl() (bsc#1012382).
- cifs: prevent integer overflow in nxt_dir_entry() (bnc#1012382).
- cifs: read overflow in is_valid_oplock_break() (bnc#1012382).
- clk: imx6ul: fix missing of_node_put() (bnc#1012382).
- clocksource/drivers/ti-32k: Add CLOCK_SOURCE_SUSPEND_NONSTOP flag for non-am43 SoCs (bnc#1012382).
- config.sh: set BUGZILLA_PRODUCT for SLE12-SP3
- coresight: Handle errors in finding input/output ports (bnc#1012382).
- coresight: tpiu: Fix disabling timeouts (bnc#1012382).
- cpu/hotplug: Fix SMT supported evaluation (bsc#1089343).
- crypto: mxs-dcp - Fix wait logic on chan threads (bnc#1012382).
- crypto: sharah - Unregister correct algorithms for SAHARA 3 (bnc#1012382).
- crypto: skcipher - Fix -Wstringop-truncation warnings (bnc#1012382).
- Define dependencies of in-kernel KMPs statically This allows us to use rpm's internal dependency generator (bsc#981083).
- Define early_radix_enabled() (bsc#1094244).
- dmaengine: pl330: fix irq race with terminate_all (bnc#1012382).
- dm cache: fix resize crash if user does not reload cache table (bnc#1012382).
- dm thin metadata: fix __udivdi3 undefined on 32-bit (bnc#1012382).
- dm thin metadata: try to avoid ever aborting transactions (bnc#1012382).
- Do not ship firmware (bsc#1054239). Pull firmware from kernel-firmware instead.
- drivers: net: cpsw: fix parsing of phy-handle DT property in dual_emac config (bnc#1012382).
- drivers: net: cpsw: fix segfault in case of bad phy-handle (bnc#1012382).
- drivers/tty: add error handling for pcmcia_loop_config (bnc#1012382).
- drm/amdgpu: Fix SDMA HQD destroy error on gfx_v7 (bnc#1012382).
- drm/amdkfd: Fix error codes in kfd_get_process (bnc#1012382).
- drm/nouveau/drm/nouveau: Use pm_runtime_get_noresume() in connector_detect() (bnc#1012382).
- drm/nouveau/TBDdevinit: do not fail when PMU/PRE_OS is missing from VBIOS (bnc#1012382).
- drm/nouveau: tegra: Detach from ARM DMA/IOMMU mapping (bnc#1012382).
- drm/virtio: fix bounds check in virtio_gpu_cmd_get_capset() (bsc#1106929)
- Drop dtb-source.spec and move the sources to kernel-source (bsc#1011920)
- e1000: check on netif_running() before calling e1000_up() (bnc#1012382).
- e1000: ensure to free old tx/rx rings in set_ringparam() (bnc#1012382).
- ebtables: arpreply: Add the standard target sanity check (bnc#1012382).
- edac, thunderx: Fix memory leak in thunderx_l2c_threaded_isr() (bsc#1114648).
- ethernet: ti: davinci_emac: add missing of_node_put after calling of_parse_phandle (bnc#1012382).
- ethtool: Remove trailing semicolon for static inline (bnc#1012382).
- ethtool: restore erroneously removed break in dev_ethtool (bsc#1114229).
- ext4: avoid divide by zero fault when deleting corrupted inline directories (bnc#1012382).
- ext4: do not mark mmp buffer head dirty (bnc#1012382).
- ext4: fix online resize's handling of a too-small final block group (bnc#1012382).
- ext4: fix online resizing for bigalloc file systems with a 1k block size (bnc#1012382).
- ext4: recalucate superblock checksum after updating free blocks/inodes (bnc#1012382).
- f2fs: do not set free of current section (bnc#1012382).
- f2fs: fix to do sanity check with {sit,nat}_ver_bitmap_bytesize (bnc#1012382).
- fbdev: Distinguish between interlaced and progressive modes (bnc#1012382).
- fbdev: fix broken menu dependencies (bsc#1106929)
- fbdev/omapfb: fix omapfb_memory_read infoleak (bnc#1012382).
- fbdev/via: fix defined but not used warning (bnc#1012382).
- floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl (bnc#1012382).
- fs/cifs: do not translate SFM_SLASH (U+F026) to backslash (bnc#1012382).
- fs/cifs: suppress a string overflow warning (bnc#1012382).
- fs/eventpoll: loosen irq-safety when possible (bsc#1096052).
- gfs2: Special-case rindex for gfs2_grow (bnc#1012382).
- gpio: adp5588: Fix sleep-in-atomic-context bug (bnc#1012382).
- gpiolib: Mark gpio_suffixes array with __maybe_unused (bnc#1012382).
- gpio: ml-ioh: Fix buffer underwrite on probe error path (bnc#1012382).
- gpio: tegra: Move driver registration to subsys_init level (bnc#1012382).
- gso_segment: Reset skb->mac_len after modifying network header (bnc#1012382).
- hexagon: modify ffs() and fls() to return int (bnc#1012382).
- hid: hid-ntrig: add error handling for sysfs_create_group (bnc#1012382).
- hid: sony: Support DS4 dongle (bnc#1012382).
- hid: sony: Update device ids (bnc#1012382).
- hv: avoid crash in vmbus sysfs files (bnc#1108377).
- hwmon: (adt7475) Make adt7475_read_word() return errors (bnc#1012382).
- hwmon: (ina2xx) fix sysfs shunt resistor read access (bnc#1012382).
- i2c: i2c-scmi: fix for i2c_smbus_write_block_data (bnc#1012382).
- i2c: i801: Allow ACPI AML access I/O ports not reserved for SMBus (bnc#1012382).
- i2c: i801: fix DNV's SMBCTRL register offset (bnc#1012382).
- i2c: uniphier-f: issue STOP only for last message or I2C_M_STOP (bnc#1012382).
- i2c: uniphier: issue STOP only for last message or I2C_M_STOP (bnc#1012382).
- i2c: xiic: Make the start and the byte count write atomic (bnc#1012382).
- i2c: xlp9xx: Add support for SMBAlert (bsc#1103308).
- i2c: xlp9xx: Fix case where SSIF read transaction completes early (bsc#1103308).
- i2c: xlp9xx: Fix issue seen when updating receive length (bsc#1103308).
- i2c: xlp9xx: Make sure the transfer size is not more than I2C_SMBUS_BLOCK_SIZE (bsc#1103308).
- ib/ipoib: Avoid a race condition between start_xmit and cm_rep_handler (bnc#1012382).
- ib/srp: Avoid that sg_reset -d ${srp_device} triggers an infinite loop (bnc#1012382).
- input: atakbd - fix Atari CapsLock behaviour (bnc#1012382).
- input: atakbd - fix Atari keymap (bnc#1012382).
- input: atmel_mxt_ts - only use first T9 instance (bnc#1012382).
- input: elantech - enable middle button of touchpad on ThinkPad P72 (bnc#1012382).
- iommu/amd: Return devid as alias for ACPI HID devices (bsc#1106105).
- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bnc#1012382).
- iommu/ipmmu-vmsa: Fix allocation in atomic context (bnc#1012382).
- ip6_tunnel: be careful when accessing the inner header (bnc#1012382).
- ipmi:ssif: Add support for multi-part transmit messages > 2 parts (bsc#1103308).
- ip_tunnel: be careful when accessing the inner header (bnc#1012382).
- ipv4: fix use-after-free in ip_cmsg_recv_dstaddr() (bnc#1012382).
- ipv6: fix possible use-after-free in ip6_xmit() (bnc#1012382).
- iw_cxgb4: only allow 1 flush on user qps (bnc#1012382).
- ixgbe: pci_set_drvdata must be called before register_netdev (Git-fixes bsc#1109923).
- jffs2: return -ERANGE when xattr buffer is too small (bnc#1012382).
- KABI: move the new handler to end of machdep_calls and hide it from genksyms (bsc#1094244).
- kABI: protect struct hnae_desc_cb (kabi).
- kbuild: add .DELETE_ON_ERROR special target (bnc#1012382).
- kernel-obs-build.spec.in: add --no-hostonly-cmdline to dracut invocation (boo#1062303). call dracut with --no-hostonly-cmdline to avoid the random rootfs UUID being added into the initrd's /etc/cmdline.d/95root-dev.conf
- kernel-obs-build: use pae and lpae kernels where available (bsc#1073579).
- kernel/params.c: downgrade warning for unsafe parameters (bsc#1050549).
- kprobes/x86: Release insn_slot in failure path (bsc#1110006).
- kthread: fix boot hang (regression) on MIPS/OpenRISC (bnc#1012382).
- kthread: Fix use-after-free if kthread fork fails (bnc#1012382).
- kvm: nVMX: Do not expose MPX VMX controls when guest MPX disabled (bsc#1106240).
- kvm: nVMX: Do not flush TLB when vmcs12 uses VPID (bsc#1106240).
- kvm: PPC: Book3S HV: Do not truncate HPTE index in xlate function (bnc#1012382).
- kvm: x86: Do not re-{try,execute} after failed emulation in L2 (bsc#1106240).
- kvm: x86: Do not use kvm_x86_ops->mpx_supported() directly (bsc#1106240).
- kvm: x86: fix APIC page invalidation (bsc#1106240).
- kvm: x86: remove eager_fpu field of struct kvm_vcpu_arch (bnc#1012382).
- kvm/x86: remove WARN_ON() for when vm_munmap() fails (bsc#1106240).
- kvm: x86: SVM: Call x86_spec_ctrl_set_guest/host() with interrupts disabled (bsc#1106240).
- lib/test_hexdump.c: fix failure on big endian cpu (bsc#1106110).
- locking/osq_lock: Fix osq_lock queue corruption (bnc#1012382).
- locking/rwsem-xadd: Fix missed wakeup due to reordering of load (bnc#1012382).
- lpfc: fixup crash in lpfc_els_unsol_buffer() (bsc#1107318).
- mac80211: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bnc#1012382).
- mac80211: fix a race between restart and CSA flows (bnc#1012382).
- mac80211: fix setting IEEE80211_KEY_FLAG_RX_MGMT for AP mode keys (bnc#1012382).
- mac80211: Fix station bandwidth setting after channel switch (bnc#1012382).
- mac80211_hwsim: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bnc#1012382).
- mac80211: mesh: fix HWMP sequence numbering to follow standard (bnc#1012382).
- mac80211: restrict delayed tailroom needed decrement (bnc#1012382).
- mac80211: shorten the IBSS debug messages (bnc#1012382).
- mach64: detect the dot clock divider correctly on sparc (bnc#1012382).
- macintosh/via-pmu: Add missing mmio accessors (bnc#1012382).
- macros.kernel-source: define linux_arch for KMPs (boo#1098050). CONFIG_64BIT is no longer defined so KMP spec files need to include %{?linux_make_arch} in any make call to build modules or descent into the kernel directory for any reason.
- macros.kernel-source: pass -b properly in kernel module package (bsc#1107870).
- macros.kernel-source: pass -f properly in module subpackage (boo#1076393).
- md-cluster: clear another node's suspend_area after the copy is finished (bnc#1012382).
- md/raid1: exit sync request if MD_RECOVERY_INTR is set (git-fixes).
- md/raid5: fix data corruption of replacements after originals dropped (bnc#1012382).
- media: af9035: prevent buffer overflow on write (bnc#1012382).
- media: exynos4-is: Prevent NULL pointer dereference in __isp_video_try_fmt() (bnc#1012382).
- media: fsl-viu: fix error handling in viu_of_probe() (bnc#1012382).
- media: omap3isp: zero-initialize the isp cam_xclk{a,b} initial data (bnc#1012382).
- media: omap_vout: Fix a possible null pointer dereference in omap_vout_open() (bsc#1050431).
- media: s3c-camif: ignore -ENOIOCTLCMD from v4l2_subdev_call for s_power (bnc#1012382).
- media: soc_camera: ov772x: correct setting of banding filter (bnc#1012382).
- media: tm6000: add error handling for dvb_register_adapter (bnc#1012382).
- media: uvcvideo: Support realtek's UVC 1.5 device (bnc#1012382).
- media: v4l: event: Prevent freeing event subscriptions while accessed (bnc#1012382).
- media: videobuf2-core: check for q->error in vb2_core_qbuf() (bnc#1012382).
- media: videobuf-dma-sg: Fix dma_{sync,unmap}_sg() calls (bsc#1050431).
- mei: bus: type promotion bug in mei_nfc_if_version() (bnc#1012382).
- memory_hotplug: cond_resched in __remove_pages (bnc#1114178).
- mfd: omap-usb-host: Fix dts probe of children (bnc#1012382).
- mfd: ti_am335x_tscadc: Fix struct clk memory leak (bnc#1012382).
- misc: hmc6352: fix potential Spectre v1 (bnc#1012382).
- misc: mic: SCIF Fix scif_get_new_port() error handling (bnc#1012382).
- misc: ti-st: Fix memory leak in the error path of probe() (bnc#1012382).
- mmc: mmci: stop building qcom dml as module (bsc#1110468).
- mm: fix devmem_is_allowed() for sub-page System RAM intersections (bsc#1110006).
- mm: get rid of vmacache_flush_all() entirely (bnc#1012382).
- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (bnc#1012382).
- mm: /proc/pid/pagemap: hide swap entries from unprivileged users (Git-fixes bsc#1109907).
- mm: shmem.c: Correctly annotate new inodes for lockdep (bnc#1012382).
- mm/vmstat.c: fix outdated vmstat_text (bnc#1012382).
- mm/vmstat.c: skip NR_TLB_REMOTE_FLUSH* properly (bnc#1012382).
- mm/vmstat.c: skip NR_TLB_REMOTE_FLUSH* properly (git fixes).
- module: exclude SHN_UNDEF symbols from kallsyms api (bnc#1012382).
- mtdchar: fix overflows in adjustment of `count` (bnc#1012382).
- mtd/maps: fix solutionengine.c printk format warnings (bnc#1012382).
- neighbour: confirm neigh entries when ARP packet is received (bnc#1012382).
- net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT (bnc#1012382).
- net: cadence: Fix a sleep-in-atomic-context bug in macb_halt_tx() (bnc#1012382).
- net: dcb: For wild-card lookups, use priority -1, not 0 (bnc#1012382).
- net: ethernet: mvneta: Fix napi structure mixup on armada 3700 (bsc#1110616).
- net: ethernet: ti: cpsw: fix mdio device reference leak (bnc#1012382).
- netfilter: x_tables: avoid stack-out-of-bounds read in xt_copy_counters_from_user (bnc#1012382).
- net: hns: fix length and page_offset overflow when CONFIG_ARM64_64K_PAGES (bnc#1012382).
- net: hp100: fix always-true check for link up state (bnc#1012382).
- net: ipv4: update fnhe_pmtu when first hop's MTU changes (bnc#1012382).
- net/ipv6: Display all addresses in output of /proc/net/if_inet6 (bnc#1012382).
- netlabel: check for IPV4MASK in addrinfo_get (bnc#1012382).
- net: macb: disable scatter-gather for macb on sama5d3 (bnc#1012382).
- net/mlx4: Use cpumask_available for eq->affinity_mask (bnc#1012382).
- net: mvneta: fix mtu change on port without link (bnc#1012382).
- net: mvneta: fix mvneta_config_rss on armada 3700 (bsc#1110615).
- net: mvpp2: Extract the correct ethtype from the skb for tx csum offload (bnc#1012382).
- net: systemport: Fix wake-up interrupt race during resume (bnc#1012382).
- net/usb: cancel pending work when unbinding smsc75xx (bnc#1012382).
- nfc: Fix possible memory corruption when handling SHDLC I-Frame commands (bnc#1012382).
- nfc: Fix the number of pipes (bnc#1012382).
- nfs: add nostatflush mount option (bsc#1065726).
- nfs: Avoid quadratic search when freeing delegations (bsc#1084760).
- nfsd: fix corrupted reply to badly ordered compound (bnc#1012382).
- nfs: Use an appropriate work queue for direct-write completion (bsc#1082519).
- nfsv4.0 fix client reference leak in callback (bnc#1012382).
- ocfs2: fix locking for res->tracking and dlm->tracking_list (bnc#1012382).
- ocfs2: fix ocfs2 read block panic (bnc#1012382).
- of: unittest: Disable interrupt node tests for old world MAC systems (bnc#1012382).
- ovl: Copy inode attributes after setting xattr (bsc#1107299).
- parport: sunbpp: fix error return code (bnc#1012382).
- partitions/aix: append null character to print data from disk (bnc#1012382).
- partitions/aix: fix usage of uninitialized lv_info and lvname structures (bnc#1012382).
- Pass x86 as architecture on x86_64 and i386 (bsc#1093118).
- pci: altera: Fix bool initialization in tlp_read_packet() (bsc#1109806).
- pci: designware: Fix I/O space page leak (bsc#1109806).
- pci: designware: Fix pci_remap_iospace() failure path (bsc#1109806).
- pci: hv: Use effective affinity mask (bsc#1109772).
- pci: OF: Fix I/O space page leak (bsc#1109806).
- pci: pciehp: Fix unprotected list iteration in IRQ handler (bsc#1109806).
- pci: Reprogram bridge prefetch registers on resume (bnc#1012382).
- pci: shpchp: Fix AMD POGO identification (bsc#1109806).
- pci: Supply CPU physical address (not bus address) to iomem_is_exclusive() (bsc#1109806).
- pci: versatile: Fix I/O space page leak (bsc#1109806).
- pci: versatile: Fix pci_remap_iospace() failure path (bsc#1109806).
- pci: xgene: Fix I/O space page leak (bsc#1109806).
- pci: xilinx: Add missing of_node_put() (bsc#1109806).
- perf powerpc: Fix callchain ip filtering (bnc#1012382).
- perf powerpc: Fix callchain ip filtering when return address is in a register (bnc#1012382).
- perf probe powerpc: Ignore SyS symbols irrespective of endianness (bnc#1012382).
- perf script python: Fix export-to-postgresql.py occasional failure (bnc#1012382).
- perf tools: Allow overriding MAX_NR_CPUS at compile time (bnc#1012382).
- phy: qcom-ufs: add MODULE_LICENSE tag (bsc#1110468).
- pinctrl: qcom: spmi-gpio: Fix pmic_gpio_config_get() to be compliant (bnc#1012382).
- pipe: actually allow root to exceed the pipe buffer limit (git-fixes).
- platform/x86: alienware-wmi: Correct a memory leak (bnc#1012382).
- platform/x86: toshiba_acpi: Fix defined but not used build warnings (bnc#1012382).
- pm / core: Clear the direct_complete flag on errors (bnc#1012382).
- powerpc/64s: move machine check SLB flushing to mm/slb.c (bsc#1094244).
- powerpc/kdump: Handle crashkernel memory reservation failure (bnc#1012382).
- powerpc/mce: Fix SLB rebolting during MCE recovery path (bsc#1094244).
- powerpc/numa: Skip onlining a offline node in kdump path (bsc#1109784).
- powerpc/numa: Use associativity if VPHN hcall is successful (bsc#1110363).
- powerpc/perf/hv-24x7: Fix passing of catalog version number (bsc#1053043).
- powerpc/powernv: opal_put_chars partial write fix (bnc#1012382).
- powerpc/pseries: Defer the logging of rtas error to irq work queue (bsc#1094244).
- powerpc/pseries: Define MCE error event section (bsc#1094244).
- powerpc/pseries: Display machine check error details (bsc#1094244).
- powerpc/pseries: Dump the SLB contents on SLB MCE errors (bsc#1094244).
- powerpc/pseries: Fix build break for SPLPAR=n and CPU hotplug (bsc#1079524, git-fixes).
- powerpc/pseries: Fix CONFIG_NUMA=n build (bsc#1067906, git-fixes).
- powerpc/pseries: Flush SLB contents on SLB MCE errors (bsc#1094244).
- powerpc/pseries/mm: call H_BLOCK_REMOVE (bsc#1109158).
- powerpc/pseries/mm: factorize PTE slot computation (bsc#1109158).
- powerpc/pseries/mm: Introducing FW_FEATURE_BLOCK_REMOVE (bsc#1109158).
- powerpc/rtas: Fix a potential race between CPU-Offline & Migration (bsc#1111870).
- powerpc/tm: Avoid possible userspace r1 corruption on reclaim (bsc#1109333).
- power: vexpress: fix corruption in notifier registration (bnc#1012382).
- printk: do not spin in printk when in nmi (bsc#1094244).
- proc: restrict kernel stack dumps to root (bnc#1012382).
- pstore: Fix incorrect persistent ram buffer mapping (bnc#1012382).
- qlcnic: fix Tx descriptor corruption on 82xx devices (bnc#1012382).
- r8169: Clear RTL_FLAG_TASK_*_PENDING when clearing RTL_FLAG_TASK_ENABLED (bnc#1012382).
- raid10 BUG_ON in raise_barrier when force is true and conf->barrier is 0 (bnc#1012382).
- rculist: add list_for_each_entry_from_rcu() (bsc#1084760).
- rculist: Improve documentation for list_for_each_entry_from_rcu() (bsc#1084760).
- rdma/cma: Do not ignore net namespace for unbound cm_id (bnc#1012382).
- rdma/cma: Protect cma dev list with lock (bnc#1012382).
- rdma/ucma: check fd type in ucma_migrate_id() (bnc#1012382).
- reiserfs: add check to detect corrupted directory entry (bsc#1109818).
- reiserfs: do not panic on bad directory entries (bsc#1109818).
- resource: Include resource end in walk_*() interfaces (bsc#1114648).
- Revert 'btrfs: qgroups: Retry after commit on getting EDQUOT' (bsc#1031392).
- Revert 'dma-buf/sync-file: Avoid enable fence signaling if poll(.timeout=0)' (bsc#1111363).
- Revert 'drm: Do not pass negative delta to ktime_sub_ns()' (bsc#1106929)
- Revert 'drm/i915: Initialize HWS page address after GPU reset' (bsc#1106929)
- Revert 'Drop kernel trampoline stack.' This reverts commit 85dead31706c1c1755adff90405ff9861c39c704.
- Revert 'kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)' This reverts commit edde1f21880e3bfe244c6f98a3733b05b13533dc.
- Revert 'kvm: x86: remove eager_fpu field of struct kvm_vcpu_arch' (kabi).
- Revert 'media: v4l: event: Prevent freeing event subscriptions while accessed' (kabi).
- Revert 'mm: get rid of vmacache_flush_all() entirely' (kabi).
- Revert 'NFC: Fix the number of pipes' (kabi).
- Revert 'proc: restrict kernel stack dumps to root' (kabi).
- Revert 'Skip intel_crt_init for Dell XPS 8700' (bsc#1106929)
- Revert 'tcp: add tcp_ooo_try_coalesce() helper' (kabi).
- Revert 'tcp: call tcp_drop() from tcp_data_queue_ofo()' (kabi).
- Revert 'tcp: fix a stale ooo_last_skb after a replace' (kabi).
- Revert 'tcp: free batches of packets in tcp_prune_ofo_queue()' (kabi).
- Revert 'tcp: use an RB tree for ooo receive queue' (kabi).
- Revert 'usb: cdc-wdm: Fix a sleep-in-atomic-context bug in service_outstanding_interrupt()' (bnc#1012382).
- Revert 'x86/fpu: Finish excising 'eagerfpu'' (kabi).
- Revert 'x86/fpu: Remove struct fpu::counter' (kabi).
- Revert 'x86/fpu: Remove use_eager_fpu()' (kabi).
- ring-buffer: Allow for rescheduling when removing pages (bnc#1012382).
- rndis_wlan: potential buffer overflow in rndis_wlan_auth_indication() (bnc#1012382).
- rpm/kernel-binary.spec.in: Check module licenses (bsc#1083215,bsc#1083527)
- rpm/kernel-binary.spec.in: Do not sign modules if CONFIG_MODULE_SIG=n (bsc#1035053)
- rpm/kernel-binary.spec.in: Obsolete ftsteutates KMP (boo#997172)
- rpm/kernel-binary.spec.in: Only kernel-syzkaller needs gcc-devel (boo#1043591).
- rpm/kernel-docs.spec.in: Expand kernel tree directly from sources (bsc#1057199)
- rpm/kernel-docs.spec.in: Fix and cleanup for 4.13 doc build (bsc#1048129) The whole DocBook stuff has been deleted. The PDF build still non-working thus the sub-packaging disabled so far.
- rpm/kernel-docs.spec.in: refresh dependencies for PDF build (bsc#1048129) But it still does not work with Tex Live 2017, thus disabled yet. Also add texlive-anyfontsize for HTML math handling.
- rpm/kernel-module-subpackage: Generate proper supplements in the template ... instead of relying on find-provides.ksyms to do it (bsc#981083).
- rpm/kernel-source.spec.in: Do not list deleted depdendency helpers (bsc#981083).
- rpm/kernel-spec-macros: Try harder to detect Build Service environment (bsc#1078788)
- rtc: bq4802: add error handling for devm_ioremap (bnc#1012382).
- rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096 (bnc#1012382).
- s390/chsc: Add exception handler for CHSC instruction (git-fixes).
- s390/extmem: fix gcc 8 stringop-overflow warning (bnc#1012382).
- s390/facilites: use stfle_fac_list array size for MAX_FACILITY_BIT (bnc#1108315, LTC#171326).
- s390/kdump: Fix elfcorehdr size calculation (git-fixes).
- s390/kdump: Make elfcorehdr size calculation ABI compliant (git-fixes).
- s390/mm: correct allocate_pgste proc_handler callback (git-fixes).
- s390/qeth: do not dump past end of unknown HW header (bnc#1012382).
- s390/qeth: fix race in used-buffer accounting (bnc#1012382).
- s390/qeth: handle failure on workqueue creation (git-fixes).
- s390/qeth: reset layer2 attribute on layer switch (bnc#1012382).
- s390/qeth: use vzalloc for QUERY OAT buffer (bnc#1108315, LTC#171527).
- s390: revert ELF_ET_DYN_BASE base changes (git-fixes).
- s390/stacktrace: fix address ranges for asynchronous and panic stack (git-fixes).
- sched/fair: Fix bandwidth timer clock drift condition (Git-fixes).
- sched/fair: Fix vruntime_normalized() for remote non-migration wakeup (Git-fixes).
- scsi: 3ware: fix return 0 on the error path of probe (bnc#1012382).
- scsi: bnx2i: add error handling for ioremap_nocache (bnc#1012382).
- scsi: ibmvscsi: Improve strings handling (bnc#1012382).
- scsi: klist: Make it safe to use klists in atomic context (bnc#1012382).
- scsi: target: fix __transport_register_session locking (bnc#1012382).
- scsi: target/iscsi: Make iscsit_ta_authentication() respect the output buffer size (bnc#1012382).
- selftests/efivarfs: add required kernel configs (bnc#1012382).
- selftest: timers: Tweak raw_skew to SKIP when ADJ_OFFSET/other clock adjustments are in progress (bnc#1012382).
- selinux: use GFP_NOWAIT in the AVC kmem_caches (bnc#1012382).
- serial: cpm_uart: return immediately from console poll (bnc#1012382).
- serial: imx: restore handshaking irq for imx1 (bnc#1012382).
- signal: Properly deliver SIGSEGV from x86 uprobes (bsc#1110006).
- slub: make ->cpu_partial unsigned int (bnc#1012382).
- smb2: fix missing files in root share directory listing (bnc#1012382).
- smb3: fill in statfs fsid and correct namelen (bsc#1112905).
- sound: enable interrupt after dma buffer initialization (bnc#1012382).
- spi: rspi: Fix interrupted DMA transfers (bnc#1012382).
- spi: rspi: Fix invalid SPI use during system suspend (bnc#1012382).
- spi: sh-msiof: Fix handling of write value for SISTR register (bnc#1012382).
- spi: sh-msiof: Fix invalid SPI use during system suspend (bnc#1012382).
- spi: tegra20-slink: explicitly enable/disable clock (bnc#1012382).
- srcu: Allow use of Tiny/Tree SRCU from both process and interrupt context (bsc#1050549).
- staging: android: ashmem: Fix mmap size validation (bnc#1012382).
- staging: rt5208: Fix a sleep-in-atomic bug in xd_copy_page (bnc#1012382).
- staging: rts5208: fix missing error check on call to rtsx_write_register (bnc#1012382).
- staging/rts5208: Fix read overflow in memcpy (bnc#1012382).
- stmmac: fix valid numbers of unicast filter entries (bnc#1012382).
- stop_machine: Atomically queue and wake stopper threads (git-fixes).
- target: log Data-Out timeouts as errors (bsc#1095805).
- target: log NOP ping timeouts as errors (bsc#1095805).
- target: split out helper for cxn timeout error stashing (bsc#1095805).
- target: stash sess_err_stats on Data-Out timeout (bsc#1095805).
- target: use ISCSI_IQN_LEN in iscsi_target_stat (bsc#1095805).
- tcp: add tcp_ooo_try_coalesce() helper (bnc#1012382).
- tcp: call tcp_drop() from tcp_data_queue_ofo() (bnc#1012382).
- tcp: fix a stale ooo_last_skb after a replace (bnc#1012382).
- tcp: free batches of packets in tcp_prune_ofo_queue() (bnc#1012382).
- tcp: increment sk_drops for dropped rx packets (bnc#1012382).
- tcp: use an RB tree for ooo receive queue (bnc#1012382).
- team: Forbid enslaving team device to itself (bnc#1012382).
- thermal: of-thermal: disable passive polling when thermal zone is disabled (bnc#1012382).
- Tools: hv: Fix a bug in the key delete code (bnc#1012382).
- tools/vm/page-types.c: fix 'defined but not used' warning (bnc#1012382).
- tools/vm/slabinfo.c: fix sign-compare warning (bnc#1012382).
- tpm: Restore functionality to xen vtpm driver (bsc#1020645, git-fixes).
- tsl2550: fix lux1_input error in low light (bnc#1012382).
- tty: Drop tty->count on tty_reopen() failure (bnc#1105428).
- tty: rocket: Fix possible buffer overwrite on register_PCI (bnc#1012382).
- tty: vt_ioctl: fix potential Spectre v1 (bnc#1012382).
- ubifs: Check for name being NULL while mounting (bnc#1012382).
- ucma: fix a use-after-free in ucma_resolve_ip() (bnc#1012382).
- uio: potential double frees if __uio_register_device() fails (bnc#1012382).
- usb: add quirk for WORLDE Controller KS49 or Prodipe MIDI 49C USB controller (bnc#1012382).
- usb: Add quirk to support DJI CineSSD (bnc#1012382).
- usb: Avoid use-after-free by flushing endpoints early in usb_set_interface() (bnc#1012382).
- usb: cdc-wdm: Fix a sleep-in-atomic-context bug in service_outstanding_interrupt() (bnc#1012382).
- usb: Do not die twice if PCI xhci host is not responding in resume (bnc#1012382).
- usb: fix error handling in usb_driver_claim_interface() (bnc#1012382).
- usb: gadget: fotg210-udc: Fix memory leak of fotg210->ep[i] (bnc#1012382).
- usb: gadget: serial: fix oops when data rx'd after close (bnc#1012382).
- usb: handle NULL config in usb_find_alt_setting() (bnc#1012382).
- usb: host: u132-hcd: Fix a sleep-in-atomic-context bug in u132_get_frame() (bnc#1012382).
- usb: misc: uss720: Fix two sleep-in-atomic-context bugs (bnc#1012382).
- usb: net2280: Fix erroneous synchronization change (bnc#1012382).
- usb: remove LPM management from usb_driver_claim_interface() (bnc#1012382).
- usb: serial: io_ti: fix array underflow in completion handler (bnc#1012382).
- usb: serial: kobil_sct: fix modem-status error handling (bnc#1012382).
- usb: serial: simple: add Motorola Tetra MTP6550 id (bnc#1012382).
- usb: serial: ti_usb_3410_5052: fix array underflow in completion handler (bnc#1012382).
- usb: usbdevfs: restore warning for nonsensical flags (bnc#1012382).
- usb: usbdevfs: sanitize flags more (bnc#1012382).
- usb: wusbcore: security: cast sizeof to int for comparison (bnc#1012382).
- usb: yurex: Check for truncation in yurex_read() (bnc#1012382).
- usb: yurex: Fix buffer over-read in yurex_write() (bnc#1012382).
- Use upstream version of pci-hyperv change 35a88a18d7
- uwb: hwa-rc: fix memory leak at probe (bnc#1012382).
- vfs: do not test owner for NFS in set_posix_acl() (bsc#1103405).
- video: goldfishfb: fix memory leak on driver remove (bnc#1012382).
- vmci: type promotion bug in qp_host_get_user_memory() (bnc#1012382).
- vmw_balloon: include asm/io.h (bnc#1012382).
- watchdog: w83627hf: Added NCT6102D support (bsc#1106434).
- wlcore: Add missing PM call for wlcore_cmd_wait_for_event_or_timeout() (bnc#1012382).
- wlcore: Fix memory leak in wlcore_cmd_wait_for_event_or_timeout (git-fixes).
- x86/apic: Fix restoring boot IRQ mode in reboot and kexec/kdump (bsc#1110006).
- x86/apic: Split disable_IO_APIC() into two functions to fix CONFIG_KEXEC_JUMP=y (bsc#1110006).
- x86/apic: Split out restore_boot_irq_mode() from disable_IO_APIC() (bsc#1110006).
- x86/boot: Fix 'run_size' calculation (bsc#1110006).
- x86/cpufeature: deduplicate X86_FEATURE_L1TF_PTEINV (kabi).
- x86/entry/64: Add two more instruction suffixes (bnc#1012382).
- x86/entry/64: Clear registers for exceptions/interrupts, to reduce speculation attack surface (bsc#1105931).
- x86/entry/64: sanitize extra registers on syscall entry (bsc#1105931).
- x86/fpu: Finish excising 'eagerfpu' (bnc#1012382).
- x86/fpu: Remove second definition of fpu in __fpu__restore_sig() (bsc#1110006).
- x86/fpu: Remove struct fpu::counter (bnc#1012382).
- x86/fpu: Remove use_eager_fpu() (bnc#1012382).
- x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772).
- x86/kaiser: Avoid loosing NMIs when using trampoline stack (bsc#1106293 bsc#1099597).
- x86/mm: Remove in_nmi() warning from vmalloc_fault() (bnc#1012382).
- x86: msr-index.h: Correct SNB_C1/C3_AUTO_UNDEMOTE defines (bsc#1110006).
- x86/numa_emulation: Fix emulated-to-physical node mapping (bnc#1012382).
- x86/paravirt: Fix some warning messages (bnc#1065600).
- x86/percpu: Fix this_cpu_read() (bsc#1110006).
- x86,sched: Allow topologies where NUMA nodes share an LLC (bsc#1091158, bsc#1101555).
- x86/spec_ctrl: Fix spec_ctrl reporting (bsc#1106913, bsc#1111516).
- x86/speculation: Apply IBPB more strictly to avoid cross-process data leak (bsc#1106913).
- x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation (bsc#1106913).
- x86/speculation: Propagate information about RSB filling mitigation to sysfs (bsc#1106913).
- x86/time: Correct the attribute on jiffies' definition (bsc#1110006).
- x86/tsc: Add missing header to tsc_msr.c (bnc#1012382).
- x86/vdso: Fix asm constraints on vDSO syscall fallbacks (bsc#1110006).
- x86/vdso: Fix vDSO build if a retpoline is emitted (bsc#1110006).
- x86/vdso: Fix vDSO syscall fallback asm constraint regression (bsc#1110006).
- x86/vdso: Only enable vDSO retpolines when enabled and supported (bsc#1110006).
- xen: avoid crash in disable_hotplug_cpu (bnc#1012382 bsc#1106594 bsc#1042422).
- xen: fix GCC warning and remove duplicate EVTCHN_ROW/EVTCHN_COL usage (bnc#1012382).
- xen: issue warning message when out of grant maptrack entries (bsc#1105795).
- xen/manage: do not complain about an empty value in control/sysrq node (bnc#1012382).
- xen/netfront: do not bug in case of too many frags (bnc#1012382).
- xen-netfront: fix queue name setting (bnc#1012382).
- xen/netfront: fix waiting for xenbus state change (bnc#1012382).
- xen-netfront: fix warn message as irq device name has '/' (bnc#1012382).
- xen/x86/vpmu: Zero struct pt_regs before calling into sample handling code (bnc#1012382).
- xfrm: fix 'passing zero to ERR_PTR()' warning (bnc#1012382).
- xhci: Add missing CAS workaround for Intel Sunrise Point xHCI (bnc#1012382).
- xhci: Do not print a warning when setting link state for disabled ports (bnc#1012382).
- x86/kexec: Correct KEXEC_BACKUP_SRC_END off-by-one error (bsc#1114648).
Patchnames
SUSE-SLE-Live-Patching-12-SP3-2018-2621
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\n\nThe SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.162 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bnc#1107829).\n- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).\n- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).\n- CVE-2018-18690: A local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE operations with conversion of an attr from short to long form (bnc#1105025).\n- CVE-2018-18710: An issue was discovered in the Linux kernel An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).\n- CVE-2018-9516: A lack of certain checks in the hid_debug_events_read() function in the drivers/hid/hid-debug.c file might have resulted in receiving userspace buffer overflow and an out-of-bounds write or to the infinite loop. (bnc#1108498).\n\nThe following non-security bugs were fixed:\n\n- 6lowpan: iphc: reset mac_header after decompress to fix panic (bnc#1012382).\n- alsa: bebob: use address returned by kmalloc() instead of kernel stack for streaming DMA mapping (bnc#1012382).\n- alsa: emu10k1: fix possible info leak to userspace on SNDRV_EMU10K1_IOCTL_INFO (bnc#1012382).\n- alsa: hda: Add AZX_DCAPS_PM_RUNTIME for AMD Raven Ridge (bnc#1012382).\n- alsa: hda - Fix cancel_work_sync() stall from jackpoll work (bnc#1012382).\n- alsa: hda/realtek - Cannot adjust speaker's volume on Dell XPS 27 7760 (bnc#1012382).\n- alsa: msnd: Fix the default sample sizes (bnc#1012382).\n- alsa: pcm: Fix snd_interval_refine first/last with open min/max (bnc#1012382).\n- alsa: usb-audio: Fix multiple definitions in AU0828_DEVICE() macro (bnc#1012382).\n- apparmor: remove no-op permission check in policy_unpack (git-fixes).\n- arc: build: Get rid of toolchain check (bnc#1012382).\n- arc: clone syscall to setp r25 as thread pointer (bnc#1012382).\n- arch/hexagon: fix kernel/dma.c build warning (bnc#1012382).\n- arc: [plat-axs*]: Enable SWAP (bnc#1012382).\n- arm64: bpf: jit JMP_JSET_{X,K} (bsc#1110613).\n- arm64: Correct type for PUD macros (bsc#1110600).\n- arm64: cpufeature: Track 32bit EL0 support (bnc#1012382).\n- arm64: dts: qcom: db410c: Fix Bluetooth LED trigger (bnc#1012382).\n- arm64: fix erroneous __raw_read_system_reg() cases (bsc#1110606).\n- arm64: Fix potential race with hardware DBM in ptep_set_access_flags() (bsc#1110605).\n- arm64: fpsimd: Avoid FPSIMD context leakage for the init task (bsc#1110603).\n- arm64: jump_label.h: use asm_volatile_goto macro instead of 'asm goto' (bnc#1012382).\n- arm64: kasan: avoid bad virt_to_pfn() (bsc#1110612).\n- arm64: kasan: avoid pfn_to_nid() before page array is initialized (bsc#1110619).\n- arm64/kasan: do not allocate extra shadow memory (bsc#1110611).\n- arm64: kernel: Update kerneldoc for cpu_suspend() rename (bsc#1110602).\n- arm64: kgdb: handle read-only text / modules (bsc#1110604).\n- arm64: kvm: Sanitize PSTATE.M when being set from userspace (bnc#1012382).\n- arm64: kvm: Tighten guest core register access from userspace (bnc#1012382).\n- arm64/mm/kasan: do not use vmemmap_populate() to initialize shadow (bsc#1110618).\n- arm64: ptrace: Avoid setting compat FP[SC]R to garbage if get_user fails (bsc#1110601).\n- arm64: supported.conf: mark armmmci as not supported\n- arm64 Update config files. (bsc#1110468) Set MMC_QCOM_DML to build-in and delete driver from supported.conf\n- arm64: vdso: fix clock_getres for 4GiB-aligned res (bsc#1110614).\n- arm: dts: at91: add new compatibility string for macb on sama5d3 (bnc#1012382).\n- arm: dts: dra7: fix DCAN node addresses (bnc#1012382).\n- arm: exynos: Clear global variable on init error path (bnc#1012382).\n- arm: hisi: check of_iomap and fix missing of_node_put (bnc#1012382).\n- arm: hisi: fix error handling and missing of_node_put (bnc#1012382).\n- arm: hisi: handle of_iomap and fix missing of_node_put (bnc#1012382).\n- arm: mvebu: declare asm symbols as character arrays in pmsu.c (bnc#1012382).\n- ASoC: cs4265: fix MMTLR Data switch control (bnc#1012382).\n- ASoC: dapm: Fix potential DAI widget pointer deref when linking DAIs (bnc#1012382).\n- ASoC: sigmadsp: safeload should not have lower byte limit (bnc#1012382).\n- ASoC: wm8804: Add ACPI support (bnc#1012382).\n- ata: libahci: Correct setting of DEVSLP register (bnc#1012382).\n- ath10k: disable bundle mgmt tx completion event support (bnc#1012382).\n- ath10k: fix scan crash due to incorrect length calculation (bnc#1012382).\n- ath10k: fix use-after-free in ath10k_wmi_cmd_send_nowait (bnc#1012382).\n- ath10k: prevent active scans on potential unusable channels (bnc#1012382).\n- ath10k: protect ath10k_htt_rx_ring_free with rx_ring.lock (bnc#1012382).\n- audit: fix use-after-free in audit_add_watch (bnc#1012382).\n- autofs: fix autofs_sbi() does not check super block type (bnc#1012382).\n- binfmt_elf: Respect error return from `regset->active' (bnc#1012382).\n- bluetooth: Add a new Realtek 8723DE ID 0bda:b009 (bnc#1012382).\n- bluetooth: h5: Fix missing dependency on BT_HCIUART_SERDEV (bnc#1012382).\n- bluetooth: hidp: Fix handling of strncpy for hid->name information (bnc#1012382).\n- bnxt_en: Fix TX timeout during netpoll (bnc#1012382).\n- bonding: avoid possible dead-lock (bnc#1012382).\n- bpf: fix cb access in socket filter programs on tail calls (bsc#1012382).\n- bpf: fix map not being uncharged during map creation failure (bsc#1012382).\n- bpf, s390: fix potential memleak when later bpf_jit_prog fails (git-fixes).\n- bpf, s390x: do not reload skb pointers in non-skb context (git-fixes).\n- bsc#1106913: Replace with upstream variants\n- btrfs: add a comp_refs() helper (dependency for bsc#1031392).\n- btrfs: add missing initialization in btrfs_check_shared (Git-fixes bsc#1112262).\n- btrfs: add tracepoints for outstanding extents mods (dependency for bsc#1031392).\n- btrfs: add wrapper for counting BTRFS_MAX_EXTENT_SIZE (dependency for bsc#1031392).\n- btrfs: cleanup extent locking sequence (dependency for bsc#1031392).\n- btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag (Follow up fixes for bsc#1031392).\n- btrfs: delayed-inode: Remove wrong qgroup meta reservation calls (bsc#1031392).\n- btrfs: delayed-inode: Use new qgroup meta rsv for delayed inode and item (bsc#1031392).\n- btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667).\n- btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).\n- btrfs: fix error handling in btrfs_dev_replace_start (bsc#1107535).\n- btrfs: fix invalid attempt to free reserved space on failure to cow range (dependency for bsc#1031392).\n- btrfs: fix missing error return in btrfs_drop_snapshot (Git-fixes bsc#1109919).\n- btrfs: Fix race condition between delayed refs and blockgroup removal (Git-fixes bsc#1112263).\n- btrfs: Fix wrong btrfs_delalloc_release_extents parameter (bsc#1031392).\n- btrfs: kill trans in run_delalloc_nocow and btrfs_cross_ref_exist (dependency for bsc#1031392).\n- btrfs: make the delalloc block rsv per inode (dependency for bsc#1031392).\n- btrfs: pass delayed_refs directly to btrfs_find_delayed_ref_head (dependency for bsc#1031392).\n- btrfs: qgroup: Add quick exit for non-fs extents (dependency for bsc#1031392).\n- btrfs: qgroup: Cleanup btrfs_qgroup_prepare_account_extents function (dependency for bsc#1031392).\n- btrfs: qgroup: Cleanup the remaining old reservation counters (bsc#1031392).\n- btrfs: qgroup: Commit transaction in advance to reduce early EDQUOT (bsc#1031392).\n- btrfs: qgroup: Do not use root->qgroup_meta_rsv for qgroup (bsc#1031392).\n- btrfs: qgroup: Fix wrong qgroup reservation update for relationship modification (bsc#1031392).\n- btrfs: qgroup: Introduce function to convert META_PREALLOC into META_PERTRANS (bsc#1031392).\n- btrfs: qgroup: Introduce helpers to update and access new qgroup rsv (bsc#1031392).\n- btrfs: qgroup: Make qgroup_reserve and its callers to use separate reservation type (bsc#1031392).\n- btrfs: qgroup: Skeleton to support separate qgroup reservation type (bsc#1031392).\n- btrfs: qgroups: opencode qgroup_free helper (dependency for bsc#1031392).\n- btrfs: qgroup: Split meta rsv type into meta_prealloc and meta_pertrans (bsc#1031392).\n- btrfs: qgroup: Update trace events for metadata reservation (bsc#1031392).\n- btrfs: qgroup: Update trace events to use new separate rsv types (bsc#1031392).\n- btrfs: qgroup: Use independent and accurate per inode qgroup rsv (bsc#1031392).\n- btrfs: qgroup: Use root::qgroup_meta_rsv_* to record qgroup meta reserved space (bsc#1031392).\n- btrfs: qgroup: Use separate meta reservation type for delalloc (bsc#1031392).\n- btrfs: remove type argument from comp_tree_refs (dependency for bsc#1031392).\n- btrfs: rework outstanding_extents (dependency for bsc#1031392).\n- btrfs: switch args for comp_*_refs (dependency for bsc#1031392).\n- btrfs: Take trans lock before access running trans in check_delayed_ref (Follow up fixes for bsc#1031392).\n- ceph: avoid a use-after-free in ceph_destroy_options() (bsc#1112007).\n- cfg80211: fix a type issue in ieee80211_chandef_to_operating_class() (bnc#1012382).\n- cfg80211: nl80211_update_ft_ies() to validate NL80211_ATTR_IE (bnc#1012382).\n- cfq: Give a chance for arming slice idle timer in case of group_idle (bnc#1012382).\n- cgroup: Fix deadlock in cpu hotplug path (bnc#1012382).\n- cgroup, netclassid: add a preemption point to write_classid (bnc#1098996).\n- cifs: check for STATUS_USER_SESSION_DELETED (bsc#1112902).\n- cifs: connect to servername instead of IP for IPC$ share (bsc#1106359).\n- cifs: fix memory leak in SMB2_open() (bsc#1112894).\n- cifs: Fix use after free of a mid_q_entry (bsc#1112903).\n- cifs: fix wrapping bugs in num_entries() (bnc#1012382).\n- cifs: integer overflow in in SMB2_ioctl() (bsc#1012382).\n- cifs: prevent integer overflow in nxt_dir_entry() (bnc#1012382).\n- cifs: read overflow in is_valid_oplock_break() (bnc#1012382).\n- clk: imx6ul: fix missing of_node_put() (bnc#1012382).\n- clocksource/drivers/ti-32k: Add CLOCK_SOURCE_SUSPEND_NONSTOP flag for non-am43 SoCs (bnc#1012382).\n- config.sh: set BUGZILLA_PRODUCT for SLE12-SP3\n- coresight: Handle errors in finding input/output ports (bnc#1012382).\n- coresight: tpiu: Fix disabling timeouts (bnc#1012382).\n- cpu/hotplug: Fix SMT supported evaluation (bsc#1089343).\n- crypto: mxs-dcp - Fix wait logic on chan threads (bnc#1012382).\n- crypto: sharah - Unregister correct algorithms for SAHARA 3 (bnc#1012382).\n- crypto: skcipher - Fix -Wstringop-truncation warnings (bnc#1012382).\n- Define dependencies of in-kernel KMPs statically This allows us to use rpm's internal dependency generator (bsc#981083).\n- Define early_radix_enabled() (bsc#1094244).\n- dmaengine: pl330: fix irq race with terminate_all (bnc#1012382).\n- dm cache: fix resize crash if user does not reload cache table (bnc#1012382).\n- dm thin metadata: fix __udivdi3 undefined on 32-bit (bnc#1012382).\n- dm thin metadata: try to avoid ever aborting transactions (bnc#1012382).\n- Do not ship firmware (bsc#1054239). Pull firmware from kernel-firmware instead.\n- drivers: net: cpsw: fix parsing of phy-handle DT property in dual_emac config (bnc#1012382).\n- drivers: net: cpsw: fix segfault in case of bad phy-handle (bnc#1012382).\n- drivers/tty: add error handling for pcmcia_loop_config (bnc#1012382).\n- drm/amdgpu: Fix SDMA HQD destroy error on gfx_v7 (bnc#1012382).\n- drm/amdkfd: Fix error codes in kfd_get_process (bnc#1012382).\n- drm/nouveau/drm/nouveau: Use pm_runtime_get_noresume() in connector_detect() (bnc#1012382).\n- drm/nouveau/TBDdevinit: do not fail when PMU/PRE_OS is missing from VBIOS (bnc#1012382).\n- drm/nouveau: tegra: Detach from ARM DMA/IOMMU mapping (bnc#1012382).\n- drm/virtio: fix bounds check in virtio_gpu_cmd_get_capset() (bsc#1106929)\n- Drop dtb-source.spec and move the sources to kernel-source (bsc#1011920)\n- e1000: check on netif_running() before calling e1000_up() (bnc#1012382).\n- e1000: ensure to free old tx/rx rings in set_ringparam() (bnc#1012382).\n- ebtables: arpreply: Add the standard target sanity check (bnc#1012382).\n- edac, thunderx: Fix memory leak in thunderx_l2c_threaded_isr() (bsc#1114648).\n- ethernet: ti: davinci_emac: add missing of_node_put after calling of_parse_phandle (bnc#1012382).\n- ethtool: Remove trailing semicolon for static inline (bnc#1012382).\n- ethtool: restore erroneously removed break in dev_ethtool (bsc#1114229).\n- ext4: avoid divide by zero fault when deleting corrupted inline directories (bnc#1012382).\n- ext4: do not mark mmp buffer head dirty (bnc#1012382).\n- ext4: fix online resize's handling of a too-small final block group (bnc#1012382).\n- ext4: fix online resizing for bigalloc file systems with a 1k block size (bnc#1012382).\n- ext4: recalucate superblock checksum after updating free blocks/inodes (bnc#1012382).\n- f2fs: do not set free of current section (bnc#1012382).\n- f2fs: fix to do sanity check with {sit,nat}_ver_bitmap_bytesize (bnc#1012382).\n- fbdev: Distinguish between interlaced and progressive modes (bnc#1012382).\n- fbdev: fix broken menu dependencies (bsc#1106929)\n- fbdev/omapfb: fix omapfb_memory_read infoleak (bnc#1012382).\n- fbdev/via: fix defined but not used warning (bnc#1012382).\n- floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl (bnc#1012382).\n- fs/cifs: do not translate SFM_SLASH (U+F026) to backslash (bnc#1012382).\n- fs/cifs: suppress a string overflow warning (bnc#1012382).\n- fs/eventpoll: loosen irq-safety when possible (bsc#1096052).\n- gfs2: Special-case rindex for gfs2_grow (bnc#1012382).\n- gpio: adp5588: Fix sleep-in-atomic-context bug (bnc#1012382).\n- gpiolib: Mark gpio_suffixes array with __maybe_unused (bnc#1012382).\n- gpio: ml-ioh: Fix buffer underwrite on probe error path (bnc#1012382).\n- gpio: tegra: Move driver registration to subsys_init level (bnc#1012382).\n- gso_segment: Reset skb->mac_len after modifying network header (bnc#1012382).\n- hexagon: modify ffs() and fls() to return int (bnc#1012382).\n- hid: hid-ntrig: add error handling for sysfs_create_group (bnc#1012382).\n- hid: sony: Support DS4 dongle (bnc#1012382).\n- hid: sony: Update device ids (bnc#1012382).\n- hv: avoid crash in vmbus sysfs files (bnc#1108377).\n- hwmon: (adt7475) Make adt7475_read_word() return errors (bnc#1012382).\n- hwmon: (ina2xx) fix sysfs shunt resistor read access (bnc#1012382).\n- i2c: i2c-scmi: fix for i2c_smbus_write_block_data (bnc#1012382).\n- i2c: i801: Allow ACPI AML access I/O ports not reserved for SMBus (bnc#1012382).\n- i2c: i801: fix DNV's SMBCTRL register offset (bnc#1012382).\n- i2c: uniphier-f: issue STOP only for last message or I2C_M_STOP (bnc#1012382).\n- i2c: uniphier: issue STOP only for last message or I2C_M_STOP (bnc#1012382).\n- i2c: xiic: Make the start and the byte count write atomic (bnc#1012382).\n- i2c: xlp9xx: Add support for SMBAlert (bsc#1103308).\n- i2c: xlp9xx: Fix case where SSIF read transaction completes early (bsc#1103308).\n- i2c: xlp9xx: Fix issue seen when updating receive length (bsc#1103308).\n- i2c: xlp9xx: Make sure the transfer size is not more than I2C_SMBUS_BLOCK_SIZE (bsc#1103308).\n- ib/ipoib: Avoid a race condition between start_xmit and cm_rep_handler (bnc#1012382).\n- ib/srp: Avoid that sg_reset -d ${srp_device} triggers an infinite loop (bnc#1012382).\n- input: atakbd - fix Atari CapsLock behaviour (bnc#1012382).\n- input: atakbd - fix Atari keymap (bnc#1012382).\n- input: atmel_mxt_ts - only use first T9 instance (bnc#1012382).\n- input: elantech - enable middle button of touchpad on ThinkPad P72 (bnc#1012382).\n- iommu/amd: Return devid as alias for ACPI HID devices (bsc#1106105).\n- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bnc#1012382).\n- iommu/ipmmu-vmsa: Fix allocation in atomic context (bnc#1012382).\n- ip6_tunnel: be careful when accessing the inner header (bnc#1012382).\n- ipmi:ssif: Add support for multi-part transmit messages > 2 parts (bsc#1103308).\n- ip_tunnel: be careful when accessing the inner header (bnc#1012382).\n- ipv4: fix use-after-free in ip_cmsg_recv_dstaddr() (bnc#1012382).\n- ipv6: fix possible use-after-free in ip6_xmit() (bnc#1012382).\n- iw_cxgb4: only allow 1 flush on user qps (bnc#1012382).\n- ixgbe: pci_set_drvdata must be called before register_netdev (Git-fixes bsc#1109923).\n- jffs2: return -ERANGE when xattr buffer is too small (bnc#1012382).\n- KABI: move the new handler to end of machdep_calls and hide it from genksyms (bsc#1094244).\n- kABI: protect struct hnae_desc_cb (kabi).\n- kbuild: add .DELETE_ON_ERROR special target (bnc#1012382).\n- kernel-obs-build.spec.in: add --no-hostonly-cmdline to dracut invocation (boo#1062303). call dracut with --no-hostonly-cmdline to avoid the random rootfs UUID being added into the initrd's /etc/cmdline.d/95root-dev.conf\n- kernel-obs-build: use pae and lpae kernels where available (bsc#1073579).\n- kernel/params.c: downgrade warning for unsafe parameters (bsc#1050549).\n- kprobes/x86: Release insn_slot in failure path (bsc#1110006).\n- kthread: fix boot hang (regression) on MIPS/OpenRISC (bnc#1012382).\n- kthread: Fix use-after-free if kthread fork fails (bnc#1012382).\n- kvm: nVMX: Do not expose MPX VMX controls when guest MPX disabled (bsc#1106240).\n- kvm: nVMX: Do not flush TLB when vmcs12 uses VPID (bsc#1106240).\n- kvm: PPC: Book3S HV: Do not truncate HPTE index in xlate function (bnc#1012382).\n- kvm: x86: Do not re-{try,execute} after failed emulation in L2 (bsc#1106240).\n- kvm: x86: Do not use kvm_x86_ops->mpx_supported() directly (bsc#1106240).\n- kvm: x86: fix APIC page invalidation (bsc#1106240).\n- kvm: x86: remove eager_fpu field of struct kvm_vcpu_arch (bnc#1012382).\n- kvm/x86: remove WARN_ON() for when vm_munmap() fails (bsc#1106240).\n- kvm: x86: SVM: Call x86_spec_ctrl_set_guest/host() with interrupts disabled (bsc#1106240).\n- lib/test_hexdump.c: fix failure on big endian cpu (bsc#1106110).\n- locking/osq_lock: Fix osq_lock queue corruption (bnc#1012382).\n- locking/rwsem-xadd: Fix missed wakeup due to reordering of load (bnc#1012382).\n- lpfc: fixup crash in lpfc_els_unsol_buffer() (bsc#1107318).\n- mac80211: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bnc#1012382).\n- mac80211: fix a race between restart and CSA flows (bnc#1012382).\n- mac80211: fix setting IEEE80211_KEY_FLAG_RX_MGMT for AP mode keys (bnc#1012382).\n- mac80211: Fix station bandwidth setting after channel switch (bnc#1012382).\n- mac80211_hwsim: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bnc#1012382).\n- mac80211: mesh: fix HWMP sequence numbering to follow standard (bnc#1012382).\n- mac80211: restrict delayed tailroom needed decrement (bnc#1012382).\n- mac80211: shorten the IBSS debug messages (bnc#1012382).\n- mach64: detect the dot clock divider correctly on sparc (bnc#1012382).\n- macintosh/via-pmu: Add missing mmio accessors (bnc#1012382).\n- macros.kernel-source: define linux_arch for KMPs (boo#1098050). CONFIG_64BIT is no longer defined so KMP spec files need to include %{?linux_make_arch} in any make call to build modules or descent into the kernel directory for any reason.\n- macros.kernel-source: pass -b properly in kernel module package (bsc#1107870).\n- macros.kernel-source: pass -f properly in module subpackage (boo#1076393).\n- md-cluster: clear another node's suspend_area after the copy is finished (bnc#1012382).\n- md/raid1: exit sync request if MD_RECOVERY_INTR is set (git-fixes).\n- md/raid5: fix data corruption of replacements after originals dropped (bnc#1012382).\n- media: af9035: prevent buffer overflow on write (bnc#1012382).\n- media: exynos4-is: Prevent NULL pointer dereference in __isp_video_try_fmt() (bnc#1012382).\n- media: fsl-viu: fix error handling in viu_of_probe() (bnc#1012382).\n- media: omap3isp: zero-initialize the isp cam_xclk{a,b} initial data (bnc#1012382).\n- media: omap_vout: Fix a possible null pointer dereference in omap_vout_open() (bsc#1050431).\n- media: s3c-camif: ignore -ENOIOCTLCMD from v4l2_subdev_call for s_power (bnc#1012382).\n- media: soc_camera: ov772x: correct setting of banding filter (bnc#1012382).\n- media: tm6000: add error handling for dvb_register_adapter (bnc#1012382).\n- media: uvcvideo: Support realtek's UVC 1.5 device (bnc#1012382).\n- media: v4l: event: Prevent freeing event subscriptions while accessed (bnc#1012382).\n- media: videobuf2-core: check for q->error in vb2_core_qbuf() (bnc#1012382).\n- media: videobuf-dma-sg: Fix dma_{sync,unmap}_sg() calls (bsc#1050431).\n- mei: bus: type promotion bug in mei_nfc_if_version() (bnc#1012382).\n- memory_hotplug: cond_resched in __remove_pages (bnc#1114178).\n- mfd: omap-usb-host: Fix dts probe of children (bnc#1012382).\n- mfd: ti_am335x_tscadc: Fix struct clk memory leak (bnc#1012382).\n- misc: hmc6352: fix potential Spectre v1 (bnc#1012382).\n- misc: mic: SCIF Fix scif_get_new_port() error handling (bnc#1012382).\n- misc: ti-st: Fix memory leak in the error path of probe() (bnc#1012382).\n- mmc: mmci: stop building qcom dml as module (bsc#1110468).\n- mm: fix devmem_is_allowed() for sub-page System RAM intersections (bsc#1110006).\n- mm: get rid of vmacache_flush_all() entirely (bnc#1012382).\n- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (bnc#1012382).\n- mm: /proc/pid/pagemap: hide swap entries from unprivileged users (Git-fixes bsc#1109907).\n- mm: shmem.c: Correctly annotate new inodes for lockdep (bnc#1012382).\n- mm/vmstat.c: fix outdated vmstat_text (bnc#1012382).\n- mm/vmstat.c: skip NR_TLB_REMOTE_FLUSH* properly (bnc#1012382).\n- mm/vmstat.c: skip NR_TLB_REMOTE_FLUSH* properly (git fixes).\n- module: exclude SHN_UNDEF symbols from kallsyms api (bnc#1012382).\n- mtdchar: fix overflows in adjustment of `count` (bnc#1012382).\n- mtd/maps: fix solutionengine.c printk format warnings (bnc#1012382).\n- neighbour: confirm neigh entries when ARP packet is received (bnc#1012382).\n- net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT (bnc#1012382).\n- net: cadence: Fix a sleep-in-atomic-context bug in macb_halt_tx() (bnc#1012382).\n- net: dcb: For wild-card lookups, use priority -1, not 0 (bnc#1012382).\n- net: ethernet: mvneta: Fix napi structure mixup on armada 3700 (bsc#1110616).\n- net: ethernet: ti: cpsw: fix mdio device reference leak (bnc#1012382).\n- netfilter: x_tables: avoid stack-out-of-bounds read in xt_copy_counters_from_user (bnc#1012382).\n- net: hns: fix length and page_offset overflow when CONFIG_ARM64_64K_PAGES (bnc#1012382).\n- net: hp100: fix always-true check for link up state (bnc#1012382).\n- net: ipv4: update fnhe_pmtu when first hop's MTU changes (bnc#1012382).\n- net/ipv6: Display all addresses in output of /proc/net/if_inet6 (bnc#1012382).\n- netlabel: check for IPV4MASK in addrinfo_get (bnc#1012382).\n- net: macb: disable scatter-gather for macb on sama5d3 (bnc#1012382).\n- net/mlx4: Use cpumask_available for eq->affinity_mask (bnc#1012382).\n- net: mvneta: fix mtu change on port without link (bnc#1012382).\n- net: mvneta: fix mvneta_config_rss on armada 3700 (bsc#1110615).\n- net: mvpp2: Extract the correct ethtype from the skb for tx csum offload (bnc#1012382).\n- net: systemport: Fix wake-up interrupt race during resume (bnc#1012382).\n- net/usb: cancel pending work when unbinding smsc75xx (bnc#1012382).\n- nfc: Fix possible memory corruption when handling SHDLC I-Frame commands (bnc#1012382).\n- nfc: Fix the number of pipes (bnc#1012382).\n- nfs: add nostatflush mount option (bsc#1065726).\n- nfs: Avoid quadratic search when freeing delegations (bsc#1084760).\n- nfsd: fix corrupted reply to badly ordered compound (bnc#1012382).\n- nfs: Use an appropriate work queue for direct-write completion (bsc#1082519).\n- nfsv4.0 fix client reference leak in callback (bnc#1012382).\n- ocfs2: fix locking for res->tracking and dlm->tracking_list (bnc#1012382).\n- ocfs2: fix ocfs2 read block panic (bnc#1012382).\n- of: unittest: Disable interrupt node tests for old world MAC systems (bnc#1012382).\n- ovl: Copy inode attributes after setting xattr (bsc#1107299).\n- parport: sunbpp: fix error return code (bnc#1012382).\n- partitions/aix: append null character to print data from disk (bnc#1012382).\n- partitions/aix: fix usage of uninitialized lv_info and lvname structures (bnc#1012382).\n- Pass x86 as architecture on x86_64 and i386 (bsc#1093118).\n- pci: altera: Fix bool initialization in tlp_read_packet() (bsc#1109806).\n- pci: designware: Fix I/O space page leak (bsc#1109806).\n- pci: designware: Fix pci_remap_iospace() failure path (bsc#1109806).\n- pci: hv: Use effective affinity mask (bsc#1109772).\n- pci: OF: Fix I/O space page leak (bsc#1109806).\n- pci: pciehp: Fix unprotected list iteration in IRQ handler (bsc#1109806).\n- pci: Reprogram bridge prefetch registers on resume (bnc#1012382).\n- pci: shpchp: Fix AMD POGO identification (bsc#1109806).\n- pci: Supply CPU physical address (not bus address) to iomem_is_exclusive() (bsc#1109806).\n- pci: versatile: Fix I/O space page leak (bsc#1109806).\n- pci: versatile: Fix pci_remap_iospace() failure path (bsc#1109806).\n- pci: xgene: Fix I/O space page leak (bsc#1109806).\n- pci: xilinx: Add missing of_node_put() (bsc#1109806).\n- perf powerpc: Fix callchain ip filtering (bnc#1012382).\n- perf powerpc: Fix callchain ip filtering when return address is in a register (bnc#1012382).\n- perf probe powerpc: Ignore SyS symbols irrespective of endianness (bnc#1012382).\n- perf script python: Fix export-to-postgresql.py occasional failure (bnc#1012382).\n- perf tools: Allow overriding MAX_NR_CPUS at compile time (bnc#1012382).\n- phy: qcom-ufs: add MODULE_LICENSE tag (bsc#1110468).\n- pinctrl: qcom: spmi-gpio: Fix pmic_gpio_config_get() to be compliant (bnc#1012382).\n- pipe: actually allow root to exceed the pipe buffer limit (git-fixes).\n- platform/x86: alienware-wmi: Correct a memory leak (bnc#1012382).\n- platform/x86: toshiba_acpi: Fix defined but not used build warnings (bnc#1012382).\n- pm / core: Clear the direct_complete flag on errors (bnc#1012382).\n- powerpc/64s: move machine check SLB flushing to mm/slb.c (bsc#1094244).\n- powerpc/kdump: Handle crashkernel memory reservation failure (bnc#1012382).\n- powerpc/mce: Fix SLB rebolting during MCE recovery path (bsc#1094244).\n- powerpc/numa: Skip onlining a offline node in kdump path (bsc#1109784).\n- powerpc/numa: Use associativity if VPHN hcall is successful (bsc#1110363).\n- powerpc/perf/hv-24x7: Fix passing of catalog version number (bsc#1053043).\n- powerpc/powernv: opal_put_chars partial write fix (bnc#1012382).\n- powerpc/pseries: Defer the logging of rtas error to irq work queue (bsc#1094244).\n- powerpc/pseries: Define MCE error event section (bsc#1094244).\n- powerpc/pseries: Display machine check error details (bsc#1094244).\n- powerpc/pseries: Dump the SLB contents on SLB MCE errors (bsc#1094244).\n- powerpc/pseries: Fix build break for SPLPAR=n and CPU hotplug (bsc#1079524, git-fixes).\n- powerpc/pseries: Fix CONFIG_NUMA=n build (bsc#1067906, git-fixes).\n- powerpc/pseries: Flush SLB contents on SLB MCE errors (bsc#1094244).\n- powerpc/pseries/mm: call H_BLOCK_REMOVE (bsc#1109158).\n- powerpc/pseries/mm: factorize PTE slot computation (bsc#1109158).\n- powerpc/pseries/mm: Introducing FW_FEATURE_BLOCK_REMOVE (bsc#1109158).\n- powerpc/rtas: Fix a potential race between CPU-Offline & Migration (bsc#1111870).\n- powerpc/tm: Avoid possible userspace r1 corruption on reclaim (bsc#1109333).\n- power: vexpress: fix corruption in notifier registration (bnc#1012382).\n- printk: do not spin in printk when in nmi (bsc#1094244).\n- proc: restrict kernel stack dumps to root (bnc#1012382).\n- pstore: Fix incorrect persistent ram buffer mapping (bnc#1012382).\n- qlcnic: fix Tx descriptor corruption on 82xx devices (bnc#1012382).\n- r8169: Clear RTL_FLAG_TASK_*_PENDING when clearing RTL_FLAG_TASK_ENABLED (bnc#1012382).\n- raid10 BUG_ON in raise_barrier when force is true and conf->barrier is 0 (bnc#1012382).\n- rculist: add list_for_each_entry_from_rcu() (bsc#1084760).\n- rculist: Improve documentation for list_for_each_entry_from_rcu() (bsc#1084760).\n- rdma/cma: Do not ignore net namespace for unbound cm_id (bnc#1012382).\n- rdma/cma: Protect cma dev list with lock (bnc#1012382).\n- rdma/ucma: check fd type in ucma_migrate_id() (bnc#1012382).\n- reiserfs: add check to detect corrupted directory entry (bsc#1109818).\n- reiserfs: do not panic on bad directory entries (bsc#1109818).\n- resource: Include resource end in walk_*() interfaces (bsc#1114648).\n- Revert 'btrfs: qgroups: Retry after commit on getting EDQUOT' (bsc#1031392).\n- Revert 'dma-buf/sync-file: Avoid enable fence signaling if poll(.timeout=0)' (bsc#1111363).\n- Revert 'drm: Do not pass negative delta to ktime_sub_ns()' (bsc#1106929)\n- Revert 'drm/i915: Initialize HWS page address after GPU reset' (bsc#1106929)\n- Revert 'Drop kernel trampoline stack.' This reverts commit 85dead31706c1c1755adff90405ff9861c39c704.\n- Revert 'kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)' This reverts commit edde1f21880e3bfe244c6f98a3733b05b13533dc.\n- Revert 'kvm: x86: remove eager_fpu field of struct kvm_vcpu_arch' (kabi).\n- Revert 'media: v4l: event: Prevent freeing event subscriptions while accessed' (kabi).\n- Revert 'mm: get rid of vmacache_flush_all() entirely' (kabi).\n- Revert 'NFC: Fix the number of pipes' (kabi).\n- Revert 'proc: restrict kernel stack dumps to root' (kabi).\n- Revert 'Skip intel_crt_init for Dell XPS 8700' (bsc#1106929)\n- Revert 'tcp: add tcp_ooo_try_coalesce() helper' (kabi).\n- Revert 'tcp: call tcp_drop() from tcp_data_queue_ofo()' (kabi).\n- Revert 'tcp: fix a stale ooo_last_skb after a replace' (kabi).\n- Revert 'tcp: free batches of packets in tcp_prune_ofo_queue()' (kabi).\n- Revert 'tcp: use an RB tree for ooo receive queue' (kabi).\n- Revert 'usb: cdc-wdm: Fix a sleep-in-atomic-context bug in service_outstanding_interrupt()' (bnc#1012382).\n- Revert 'x86/fpu: Finish excising 'eagerfpu'' (kabi).\n- Revert 'x86/fpu: Remove struct fpu::counter' (kabi).\n- Revert 'x86/fpu: Remove use_eager_fpu()' (kabi).\n- ring-buffer: Allow for rescheduling when removing pages (bnc#1012382).\n- rndis_wlan: potential buffer overflow in rndis_wlan_auth_indication() (bnc#1012382).\n- rpm/kernel-binary.spec.in: Check module licenses (bsc#1083215,bsc#1083527)\n- rpm/kernel-binary.spec.in: Do not sign modules if CONFIG_MODULE_SIG=n (bsc#1035053)\n- rpm/kernel-binary.spec.in: Obsolete ftsteutates KMP (boo#997172)\n- rpm/kernel-binary.spec.in: Only kernel-syzkaller needs gcc-devel (boo#1043591).\n- rpm/kernel-docs.spec.in: Expand kernel tree directly from sources (bsc#1057199)\n- rpm/kernel-docs.spec.in: Fix and cleanup for 4.13 doc build (bsc#1048129) The whole DocBook stuff has been deleted. The PDF build still non-working thus the sub-packaging disabled so far.\n- rpm/kernel-docs.spec.in: refresh dependencies for PDF build (bsc#1048129) But it still does not work with Tex Live 2017, thus disabled yet. Also add texlive-anyfontsize for HTML math handling.\n- rpm/kernel-module-subpackage: Generate proper supplements in the template ... instead of relying on find-provides.ksyms to do it (bsc#981083).\n- rpm/kernel-source.spec.in: Do not list deleted depdendency helpers (bsc#981083).\n- rpm/kernel-spec-macros: Try harder to detect Build Service environment (bsc#1078788)\n- rtc: bq4802: add error handling for devm_ioremap (bnc#1012382).\n- rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096 (bnc#1012382).\n- s390/chsc: Add exception handler for CHSC instruction (git-fixes).\n- s390/extmem: fix gcc 8 stringop-overflow warning (bnc#1012382).\n- s390/facilites: use stfle_fac_list array size for MAX_FACILITY_BIT (bnc#1108315, LTC#171326).\n- s390/kdump: Fix elfcorehdr size calculation (git-fixes).\n- s390/kdump: Make elfcorehdr size calculation ABI compliant (git-fixes).\n- s390/mm: correct allocate_pgste proc_handler callback (git-fixes).\n- s390/qeth: do not dump past end of unknown HW header (bnc#1012382).\n- s390/qeth: fix race in used-buffer accounting (bnc#1012382).\n- s390/qeth: handle failure on workqueue creation (git-fixes).\n- s390/qeth: reset layer2 attribute on layer switch (bnc#1012382).\n- s390/qeth: use vzalloc for QUERY OAT buffer (bnc#1108315, LTC#171527).\n- s390: revert ELF_ET_DYN_BASE base changes (git-fixes).\n- s390/stacktrace: fix address ranges for asynchronous and panic stack (git-fixes).\n- sched/fair: Fix bandwidth timer clock drift condition (Git-fixes).\n- sched/fair: Fix vruntime_normalized() for remote non-migration wakeup (Git-fixes).\n- scsi: 3ware: fix return 0 on the error path of probe (bnc#1012382).\n- scsi: bnx2i: add error handling for ioremap_nocache (bnc#1012382).\n- scsi: ibmvscsi: Improve strings handling (bnc#1012382).\n- scsi: klist: Make it safe to use klists in atomic context (bnc#1012382).\n- scsi: target: fix __transport_register_session locking (bnc#1012382).\n- scsi: target/iscsi: Make iscsit_ta_authentication() respect the output buffer size (bnc#1012382).\n- selftests/efivarfs: add required kernel configs (bnc#1012382).\n- selftest: timers: Tweak raw_skew to SKIP when ADJ_OFFSET/other clock adjustments are in progress (bnc#1012382).\n- selinux: use GFP_NOWAIT in the AVC kmem_caches (bnc#1012382).\n- serial: cpm_uart: return immediately from console poll (bnc#1012382).\n- serial: imx: restore handshaking irq for imx1 (bnc#1012382).\n- signal: Properly deliver SIGSEGV from x86 uprobes (bsc#1110006).\n- slub: make ->cpu_partial unsigned int (bnc#1012382).\n- smb2: fix missing files in root share directory listing (bnc#1012382).\n- smb3: fill in statfs fsid and correct namelen (bsc#1112905).\n- sound: enable interrupt after dma buffer initialization (bnc#1012382).\n- spi: rspi: Fix interrupted DMA transfers (bnc#1012382).\n- spi: rspi: Fix invalid SPI use during system suspend (bnc#1012382).\n- spi: sh-msiof: Fix handling of write value for SISTR register (bnc#1012382).\n- spi: sh-msiof: Fix invalid SPI use during system suspend (bnc#1012382).\n- spi: tegra20-slink: explicitly enable/disable clock (bnc#1012382).\n- srcu: Allow use of Tiny/Tree SRCU from both process and interrupt context (bsc#1050549).\n- staging: android: ashmem: Fix mmap size validation (bnc#1012382).\n- staging: rt5208: Fix a sleep-in-atomic bug in xd_copy_page (bnc#1012382).\n- staging: rts5208: fix missing error check on call to rtsx_write_register (bnc#1012382).\n- staging/rts5208: Fix read overflow in memcpy (bnc#1012382).\n- stmmac: fix valid numbers of unicast filter entries (bnc#1012382).\n- stop_machine: Atomically queue and wake stopper threads (git-fixes).\n- target: log Data-Out timeouts as errors (bsc#1095805).\n- target: log NOP ping timeouts as errors (bsc#1095805).\n- target: split out helper for cxn timeout error stashing (bsc#1095805).\n- target: stash sess_err_stats on Data-Out timeout (bsc#1095805).\n- target: use ISCSI_IQN_LEN in iscsi_target_stat (bsc#1095805).\n- tcp: add tcp_ooo_try_coalesce() helper (bnc#1012382).\n- tcp: call tcp_drop() from tcp_data_queue_ofo() (bnc#1012382).\n- tcp: fix a stale ooo_last_skb after a replace (bnc#1012382).\n- tcp: free batches of packets in tcp_prune_ofo_queue() (bnc#1012382).\n- tcp: increment sk_drops for dropped rx packets (bnc#1012382).\n- tcp: use an RB tree for ooo receive queue (bnc#1012382).\n- team: Forbid enslaving team device to itself (bnc#1012382).\n- thermal: of-thermal: disable passive polling when thermal zone is disabled (bnc#1012382).\n- Tools: hv: Fix a bug in the key delete code (bnc#1012382).\n- tools/vm/page-types.c: fix 'defined but not used' warning (bnc#1012382).\n- tools/vm/slabinfo.c: fix sign-compare warning (bnc#1012382).\n- tpm: Restore functionality to xen vtpm driver (bsc#1020645, git-fixes).\n- tsl2550: fix lux1_input error in low light (bnc#1012382).\n- tty: Drop tty->count on tty_reopen() failure (bnc#1105428).\n- tty: rocket: Fix possible buffer overwrite on register_PCI (bnc#1012382).\n- tty: vt_ioctl: fix potential Spectre v1 (bnc#1012382).\n- ubifs: Check for name being NULL while mounting (bnc#1012382).\n- ucma: fix a use-after-free in ucma_resolve_ip() (bnc#1012382).\n- uio: potential double frees if __uio_register_device() fails (bnc#1012382).\n- usb: add quirk for WORLDE Controller KS49 or Prodipe MIDI 49C USB controller (bnc#1012382).\n- usb: Add quirk to support DJI CineSSD (bnc#1012382).\n- usb: Avoid use-after-free by flushing endpoints early in usb_set_interface() (bnc#1012382).\n- usb: cdc-wdm: Fix a sleep-in-atomic-context bug in service_outstanding_interrupt() (bnc#1012382).\n- usb: Do not die twice if PCI xhci host is not responding in resume (bnc#1012382).\n- usb: fix error handling in usb_driver_claim_interface() (bnc#1012382).\n- usb: gadget: fotg210-udc: Fix memory leak of fotg210->ep[i] (bnc#1012382).\n- usb: gadget: serial: fix oops when data rx'd after close (bnc#1012382).\n- usb: handle NULL config in usb_find_alt_setting() (bnc#1012382).\n- usb: host: u132-hcd: Fix a sleep-in-atomic-context bug in u132_get_frame() (bnc#1012382).\n- usb: misc: uss720: Fix two sleep-in-atomic-context bugs (bnc#1012382).\n- usb: net2280: Fix erroneous synchronization change (bnc#1012382).\n- usb: remove LPM management from usb_driver_claim_interface() (bnc#1012382).\n- usb: serial: io_ti: fix array underflow in completion handler (bnc#1012382).\n- usb: serial: kobil_sct: fix modem-status error handling (bnc#1012382).\n- usb: serial: simple: add Motorola Tetra MTP6550 id (bnc#1012382).\n- usb: serial: ti_usb_3410_5052: fix array underflow in completion handler (bnc#1012382).\n- usb: usbdevfs: restore warning for nonsensical flags (bnc#1012382).\n- usb: usbdevfs: sanitize flags more (bnc#1012382).\n- usb: wusbcore: security: cast sizeof to int for comparison (bnc#1012382).\n- usb: yurex: Check for truncation in yurex_read() (bnc#1012382).\n- usb: yurex: Fix buffer over-read in yurex_write() (bnc#1012382).\n- Use upstream version of pci-hyperv change 35a88a18d7\n- uwb: hwa-rc: fix memory leak at probe (bnc#1012382).\n- vfs: do not test owner for NFS in set_posix_acl() (bsc#1103405).\n- video: goldfishfb: fix memory leak on driver remove (bnc#1012382).\n- vmci: type promotion bug in qp_host_get_user_memory() (bnc#1012382).\n- vmw_balloon: include asm/io.h (bnc#1012382).\n- watchdog: w83627hf: Added NCT6102D support (bsc#1106434).\n- wlcore: Add missing PM call for wlcore_cmd_wait_for_event_or_timeout() (bnc#1012382).\n- wlcore: Fix memory leak in wlcore_cmd_wait_for_event_or_timeout (git-fixes).\n- x86/apic: Fix restoring boot IRQ mode in reboot and kexec/kdump (bsc#1110006).\n- x86/apic: Split disable_IO_APIC() into two functions to fix CONFIG_KEXEC_JUMP=y (bsc#1110006).\n- x86/apic: Split out restore_boot_irq_mode() from disable_IO_APIC() (bsc#1110006).\n- x86/boot: Fix 'run_size' calculation (bsc#1110006).\n- x86/cpufeature: deduplicate X86_FEATURE_L1TF_PTEINV (kabi).\n- x86/entry/64: Add two more instruction suffixes (bnc#1012382).\n- x86/entry/64: Clear registers for exceptions/interrupts, to reduce speculation attack surface (bsc#1105931).\n- x86/entry/64: sanitize extra registers on syscall entry (bsc#1105931).\n- x86/fpu: Finish excising 'eagerfpu' (bnc#1012382).\n- x86/fpu: Remove second definition of fpu in __fpu__restore_sig() (bsc#1110006).\n- x86/fpu: Remove struct fpu::counter (bnc#1012382).\n- x86/fpu: Remove use_eager_fpu() (bnc#1012382).\n- x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772).\n- x86/kaiser: Avoid loosing NMIs when using trampoline stack (bsc#1106293 bsc#1099597).\n- x86/mm: Remove in_nmi() warning from vmalloc_fault() (bnc#1012382).\n- x86: msr-index.h: Correct SNB_C1/C3_AUTO_UNDEMOTE defines (bsc#1110006).\n- x86/numa_emulation: Fix emulated-to-physical node mapping (bnc#1012382).\n- x86/paravirt: Fix some warning messages (bnc#1065600).\n- x86/percpu: Fix this_cpu_read() (bsc#1110006).\n- x86,sched: Allow topologies where NUMA nodes share an LLC (bsc#1091158, bsc#1101555).\n- x86/spec_ctrl: Fix spec_ctrl reporting (bsc#1106913, bsc#1111516).\n- x86/speculation: Apply IBPB more strictly to avoid cross-process data leak (bsc#1106913).\n- x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation (bsc#1106913).\n- x86/speculation: Propagate information about RSB filling mitigation to sysfs (bsc#1106913).\n- x86/time: Correct the attribute on jiffies' definition (bsc#1110006).\n- x86/tsc: Add missing header to tsc_msr.c (bnc#1012382).\n- x86/vdso: Fix asm constraints on vDSO syscall fallbacks (bsc#1110006).\n- x86/vdso: Fix vDSO build if a retpoline is emitted (bsc#1110006).\n- x86/vdso: Fix vDSO syscall fallback asm constraint regression (bsc#1110006).\n- x86/vdso: Only enable vDSO retpolines when enabled and supported (bsc#1110006).\n- xen: avoid crash in disable_hotplug_cpu (bnc#1012382 bsc#1106594 bsc#1042422).\n- xen: fix GCC warning and remove duplicate EVTCHN_ROW/EVTCHN_COL usage (bnc#1012382).\n- xen: issue warning message when out of grant maptrack entries (bsc#1105795).\n- xen/manage: do not complain about an empty value in control/sysrq node (bnc#1012382).\n- xen/netfront: do not bug in case of too many frags (bnc#1012382).\n- xen-netfront: fix queue name setting (bnc#1012382).\n- xen/netfront: fix waiting for xenbus state change (bnc#1012382).\n- xen-netfront: fix warn message as irq device name has '/' (bnc#1012382).\n- xen/x86/vpmu: Zero struct pt_regs before calling into sample handling code (bnc#1012382).\n- xfrm: fix 'passing zero to ERR_PTR()' warning (bnc#1012382).\n- xhci: Add missing CAS workaround for Intel Sunrise Point xHCI (bnc#1012382).\n- xhci: Do not print a warning when setting link state for disabled ports (bnc#1012382).\n- x86/kexec: Correct KEXEC_BACKUP_SRC_END off-by-one error (bsc#1114648).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-Live-Patching-12-SP3-2018-2621", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3688-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:3688-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183688-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:3688-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-November/004843.html", }, { category: "self", summary: "SUSE Bug 1011920", url: "https://bugzilla.suse.com/1011920", }, { category: "self", summary: "SUSE Bug 1012382", url: "https://bugzilla.suse.com/1012382", }, { category: "self", summary: "SUSE Bug 1012422", url: "https://bugzilla.suse.com/1012422", }, { category: "self", summary: "SUSE Bug 1020645", url: "https://bugzilla.suse.com/1020645", }, { category: "self", summary: "SUSE Bug 1031392", url: "https://bugzilla.suse.com/1031392", }, { category: "self", summary: "SUSE Bug 1035053", url: "https://bugzilla.suse.com/1035053", }, { category: "self", summary: "SUSE Bug 1042422", url: "https://bugzilla.suse.com/1042422", }, { category: "self", summary: "SUSE Bug 1043591", url: "https://bugzilla.suse.com/1043591", }, { category: "self", summary: "SUSE Bug 1048129", url: "https://bugzilla.suse.com/1048129", }, { category: "self", summary: "SUSE Bug 1050431", url: "https://bugzilla.suse.com/1050431", }, { category: "self", summary: "SUSE Bug 1050549", url: "https://bugzilla.suse.com/1050549", }, { category: "self", summary: "SUSE Bug 1053043", url: "https://bugzilla.suse.com/1053043", }, { category: "self", summary: "SUSE Bug 1054239", url: "https://bugzilla.suse.com/1054239", }, { category: "self", summary: "SUSE Bug 1057199", url: "https://bugzilla.suse.com/1057199", }, { category: "self", summary: "SUSE Bug 1065600", url: "https://bugzilla.suse.com/1065600", }, { category: "self", summary: "SUSE Bug 1065726", url: "https://bugzilla.suse.com/1065726", }, { category: "self", summary: "SUSE Bug 1067906", url: "https://bugzilla.suse.com/1067906", }, { category: "self", summary: "SUSE Bug 1073579", url: "https://bugzilla.suse.com/1073579", }, { category: "self", summary: "SUSE Bug 1076393", url: "https://bugzilla.suse.com/1076393", }, { category: "self", summary: "SUSE Bug 1078788", url: "https://bugzilla.suse.com/1078788", }, { category: "self", summary: "SUSE Bug 1079524", url: "https://bugzilla.suse.com/1079524", }, { category: "self", summary: "SUSE Bug 1082519", url: "https://bugzilla.suse.com/1082519", }, { category: "self", summary: "SUSE Bug 1083215", url: "https://bugzilla.suse.com/1083215", }, { category: "self", summary: "SUSE Bug 1083527", url: "https://bugzilla.suse.com/1083527", }, { category: "self", summary: "SUSE Bug 1084760", url: "https://bugzilla.suse.com/1084760", }, { category: "self", summary: "SUSE Bug 1089343", url: "https://bugzilla.suse.com/1089343", }, { category: "self", summary: "SUSE Bug 1091158", url: "https://bugzilla.suse.com/1091158", }, { category: "self", summary: "SUSE Bug 1093118", url: "https://bugzilla.suse.com/1093118", }, { category: "self", summary: "SUSE Bug 1094244", url: "https://bugzilla.suse.com/1094244", }, { category: "self", summary: "SUSE Bug 1094825", url: "https://bugzilla.suse.com/1094825", }, { category: "self", summary: "SUSE Bug 1095805", url: "https://bugzilla.suse.com/1095805", }, { category: "self", summary: "SUSE Bug 1096052", url: "https://bugzilla.suse.com/1096052", }, { category: "self", summary: "SUSE Bug 1098050", url: "https://bugzilla.suse.com/1098050", }, { category: "self", summary: "SUSE Bug 1098996", url: "https://bugzilla.suse.com/1098996", }, { category: "self", summary: "SUSE Bug 1099597", url: "https://bugzilla.suse.com/1099597", }, { category: "self", summary: "SUSE Bug 1101555", url: "https://bugzilla.suse.com/1101555", }, { category: "self", summary: "SUSE Bug 1103308", url: "https://bugzilla.suse.com/1103308", }, { category: "self", summary: "SUSE Bug 1103405", url: "https://bugzilla.suse.com/1103405", }, { category: "self", summary: "SUSE Bug 1104124", url: "https://bugzilla.suse.com/1104124", }, { category: "self", summary: "SUSE Bug 1105025", url: "https://bugzilla.suse.com/1105025", }, { category: "self", summary: "SUSE Bug 1105428", url: "https://bugzilla.suse.com/1105428", }, { category: "self", summary: "SUSE Bug 1105795", url: "https://bugzilla.suse.com/1105795", }, { category: "self", summary: "SUSE Bug 1105931", url: "https://bugzilla.suse.com/1105931", }, { category: "self", summary: "SUSE Bug 1106105", url: "https://bugzilla.suse.com/1106105", }, { category: "self", summary: "SUSE Bug 1106110", url: "https://bugzilla.suse.com/1106110", }, { category: "self", summary: "SUSE Bug 1106240", url: "https://bugzilla.suse.com/1106240", }, { category: "self", summary: "SUSE Bug 1106293", url: "https://bugzilla.suse.com/1106293", }, { category: "self", summary: "SUSE Bug 1106359", url: "https://bugzilla.suse.com/1106359", }, { category: "self", summary: "SUSE Bug 1106434", url: "https://bugzilla.suse.com/1106434", }, { category: "self", summary: "SUSE Bug 1106594", url: "https://bugzilla.suse.com/1106594", }, { category: "self", summary: "SUSE Bug 1106913", url: "https://bugzilla.suse.com/1106913", }, { category: "self", summary: "SUSE Bug 1106929", url: "https://bugzilla.suse.com/1106929", }, { category: "self", summary: "SUSE Bug 1107060", url: "https://bugzilla.suse.com/1107060", }, { category: "self", summary: "SUSE Bug 1107299", url: "https://bugzilla.suse.com/1107299", }, { category: "self", summary: "SUSE Bug 1107318", url: "https://bugzilla.suse.com/1107318", }, { category: "self", summary: "SUSE Bug 1107535", url: "https://bugzilla.suse.com/1107535", }, { category: "self", summary: "SUSE Bug 1107829", url: "https://bugzilla.suse.com/1107829", }, { category: "self", summary: "SUSE Bug 1107870", url: "https://bugzilla.suse.com/1107870", }, { category: "self", summary: "SUSE Bug 1108315", url: "https://bugzilla.suse.com/1108315", }, { category: "self", summary: "SUSE Bug 1108377", url: "https://bugzilla.suse.com/1108377", }, { category: "self", summary: "SUSE Bug 1108498", url: "https://bugzilla.suse.com/1108498", }, { category: "self", summary: "SUSE Bug 1109158", url: "https://bugzilla.suse.com/1109158", }, { category: "self", summary: "SUSE Bug 1109333", url: "https://bugzilla.suse.com/1109333", }, { category: "self", summary: "SUSE Bug 1109772", url: "https://bugzilla.suse.com/1109772", }, { category: "self", summary: "SUSE Bug 1109784", url: "https://bugzilla.suse.com/1109784", }, { category: "self", summary: "SUSE Bug 1109806", url: "https://bugzilla.suse.com/1109806", }, { category: "self", summary: "SUSE Bug 1109818", url: "https://bugzilla.suse.com/1109818", }, { category: "self", summary: "SUSE Bug 1109907", url: "https://bugzilla.suse.com/1109907", }, { category: "self", summary: "SUSE Bug 1109919", url: "https://bugzilla.suse.com/1109919", }, { category: "self", summary: "SUSE Bug 1109923", url: "https://bugzilla.suse.com/1109923", }, { category: "self", summary: "SUSE Bug 1110006", url: "https://bugzilla.suse.com/1110006", }, { category: "self", summary: "SUSE Bug 1110363", url: "https://bugzilla.suse.com/1110363", }, { category: "self", summary: "SUSE Bug 1110468", url: "https://bugzilla.suse.com/1110468", }, { category: "self", summary: "SUSE Bug 1110600", url: "https://bugzilla.suse.com/1110600", }, { category: "self", summary: "SUSE Bug 1110601", url: "https://bugzilla.suse.com/1110601", }, { category: "self", summary: "SUSE Bug 1110602", url: "https://bugzilla.suse.com/1110602", }, { category: "self", summary: "SUSE Bug 1110603", url: "https://bugzilla.suse.com/1110603", }, { category: "self", summary: "SUSE Bug 1110604", url: "https://bugzilla.suse.com/1110604", }, { category: "self", summary: "SUSE Bug 1110605", url: "https://bugzilla.suse.com/1110605", }, { category: "self", summary: "SUSE Bug 1110606", url: "https://bugzilla.suse.com/1110606", }, { category: "self", summary: "SUSE Bug 1110611", url: "https://bugzilla.suse.com/1110611", }, { category: "self", summary: "SUSE Bug 1110612", url: "https://bugzilla.suse.com/1110612", }, { category: "self", summary: "SUSE Bug 1110613", url: "https://bugzilla.suse.com/1110613", }, { category: "self", summary: "SUSE Bug 1110614", url: "https://bugzilla.suse.com/1110614", }, { category: "self", summary: "SUSE Bug 1110615", url: "https://bugzilla.suse.com/1110615", }, { category: "self", summary: "SUSE Bug 1110616", url: "https://bugzilla.suse.com/1110616", }, { category: "self", summary: "SUSE Bug 1110618", url: "https://bugzilla.suse.com/1110618", }, { category: "self", summary: "SUSE Bug 1110619", url: "https://bugzilla.suse.com/1110619", }, { category: "self", summary: "SUSE Bug 1111363", url: "https://bugzilla.suse.com/1111363", }, { category: "self", summary: "SUSE Bug 1111516", url: "https://bugzilla.suse.com/1111516", }, { category: "self", summary: "SUSE Bug 1111870", url: "https://bugzilla.suse.com/1111870", }, { category: "self", summary: "SUSE Bug 1112007", url: "https://bugzilla.suse.com/1112007", }, { category: "self", summary: "SUSE Bug 1112262", url: "https://bugzilla.suse.com/1112262", }, { category: "self", summary: "SUSE Bug 1112263", url: "https://bugzilla.suse.com/1112263", }, { category: "self", summary: "SUSE Bug 1112894", url: "https://bugzilla.suse.com/1112894", }, { category: "self", summary: "SUSE Bug 1112902", url: "https://bugzilla.suse.com/1112902", }, { category: "self", summary: "SUSE Bug 1112903", url: "https://bugzilla.suse.com/1112903", }, { category: "self", summary: "SUSE Bug 1112905", url: "https://bugzilla.suse.com/1112905", }, { category: "self", summary: "SUSE Bug 1113667", url: "https://bugzilla.suse.com/1113667", }, { category: "self", summary: "SUSE Bug 1113751", url: "https://bugzilla.suse.com/1113751", }, { category: "self", summary: "SUSE Bug 1113769", url: "https://bugzilla.suse.com/1113769", }, { category: "self", summary: "SUSE Bug 1114178", url: "https://bugzilla.suse.com/1114178", }, { category: "self", summary: "SUSE Bug 1114229", url: "https://bugzilla.suse.com/1114229", }, { category: "self", summary: "SUSE Bug 1114648", url: "https://bugzilla.suse.com/1114648", }, { category: "self", summary: "SUSE Bug 981083", url: "https://bugzilla.suse.com/981083", }, { category: "self", summary: "SUSE Bug 997172", url: "https://bugzilla.suse.com/997172", }, { category: "self", summary: "SUSE CVE CVE-2018-14633 page", url: "https://www.suse.com/security/cve/CVE-2018-14633/", }, { category: "self", summary: "SUSE CVE CVE-2018-18281 page", url: "https://www.suse.com/security/cve/CVE-2018-18281/", }, { category: "self", summary: "SUSE CVE CVE-2018-18386 page", url: "https://www.suse.com/security/cve/CVE-2018-18386/", }, { category: "self", summary: "SUSE CVE CVE-2018-18690 page", url: "https://www.suse.com/security/cve/CVE-2018-18690/", }, { category: "self", summary: "SUSE CVE CVE-2018-18710 page", url: "https://www.suse.com/security/cve/CVE-2018-18710/", }, { category: "self", summary: "SUSE CVE CVE-2018-9516 page", url: "https://www.suse.com/security/cve/CVE-2018-9516/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2018-11-09T16:00:34Z", generator: { date: "2018-11-09T16:00:34Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:3688-1", initial_release_date: "2018-11-09T16:00:34Z", revision_history: [ { date: "2018-11-09T16:00:34Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kgraft-patch-4_4_162-94_69-default-1-4.5.2.ppc64le", product: { name: "kgraft-patch-4_4_162-94_69-default-1-4.5.2.ppc64le", product_id: "kgraft-patch-4_4_162-94_69-default-1-4.5.2.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kgraft-patch-4_4_162-94_69-default-1-4.5.2.x86_64", product: { name: "kgraft-patch-4_4_162-94_69-default-1-4.5.2.x86_64", product_id: "kgraft-patch-4_4_162-94_69-default-1-4.5.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Live Patching 12 SP3", product: { name: "SUSE Linux Enterprise Live Patching 12 SP3", product_id: "SUSE Linux Enterprise Live Patching 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-live-patching:12:sp3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_162-94_69-default-1-4.5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", product_id: "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.ppc64le", }, product_reference: "kgraft-patch-4_4_162-94_69-default-1-4.5.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_162-94_69-default-1-4.5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", product_id: "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.x86_64", }, product_reference: "kgraft-patch-4_4_162-94_69-default-1-4.5.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP3", }, ], }, vulnerabilities: [ { cve: "CVE-2018-14633", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14633", }, ], notes: [ { category: "general", text: "A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14633", url: "https://www.suse.com/security/cve/CVE-2018-14633", }, { category: "external", summary: "SUSE Bug 1107829 for CVE-2018-14633", url: "https://bugzilla.suse.com/1107829", }, { category: "external", summary: "SUSE Bug 1107832 for CVE-2018-14633", url: "https://bugzilla.suse.com/1107832", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-09T16:00:34Z", details: "important", }, ], title: "CVE-2018-14633", }, { cve: "CVE-2018-18281", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18281", }, ], notes: [ { category: "general", text: "Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. This is fixed in the following kernel versions: 4.9.135, 4.14.78, 4.18.16, 4.19.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18281", url: "https://www.suse.com/security/cve/CVE-2018-18281", }, { category: "external", summary: "SUSE Bug 1113769 for CVE-2018-18281", url: "https://bugzilla.suse.com/1113769", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-09T16:00:34Z", details: "moderate", }, ], title: "CVE-2018-18281", }, { cve: "CVE-2018-18386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18386", }, ], notes: [ { category: "general", text: "drivers/tty/n_tty.c in the Linux kernel before 4.14.11 allows local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18386", url: "https://www.suse.com/security/cve/CVE-2018-18386", }, { category: "external", summary: "SUSE Bug 1094825 for CVE-2018-18386", url: "https://bugzilla.suse.com/1094825", }, { category: "external", summary: "SUSE Bug 1112039 for CVE-2018-18386", url: "https://bugzilla.suse.com/1112039", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-09T16:00:34Z", details: "moderate", }, ], title: "CVE-2018-18386", }, { cve: "CVE-2018-18690", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18690", }, ], notes: [ { category: "general", text: "In the Linux kernel before 4.17, a local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandles ATTR_REPLACE operations with conversion of an attr from short to long form.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18690", url: "https://www.suse.com/security/cve/CVE-2018-18690", }, { category: "external", summary: "SUSE Bug 1105025 for CVE-2018-18690", url: "https://bugzilla.suse.com/1105025", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-09T16:00:34Z", details: "moderate", }, ], title: "CVE-2018-18690", }, { cve: "CVE-2018-18710", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18710", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18710", url: "https://www.suse.com/security/cve/CVE-2018-18710", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-18710", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-09T16:00:34Z", details: "moderate", }, ], title: "CVE-2018-18710", }, { cve: "CVE-2018-9516", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-9516", }, ], notes: [ { category: "general", text: "In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-71361580.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-9516", url: "https://www.suse.com/security/cve/CVE-2018-9516", }, { category: "external", summary: "SUSE Bug 1108498 for CVE-2018-9516", url: "https://bugzilla.suse.com/1108498", }, { category: "external", summary: "SUSE Bug 1123161 for CVE-2018-9516", url: "https://bugzilla.suse.com/1123161", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-1-4.5.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-09T16:00:34Z", details: "moderate", }, ], title: "CVE-2018-9516", }, ], }
suse-su-2018:3934-1
Vulnerability from csaf_suse
Published
2018-11-28 10:13
Modified
2018-11-28 10:13
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP4 kernel for Azure was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).
- CVE-2018-18445: Faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandled 32-bit right shifts (bnc#1112372).
- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).
- CVE-2017-18224: fs/ocfs2/aops.c omits use of a semaphore and consequently has a race condition for access to the extent tree during read operations in DIRECT mode, which allowed local users to cause a denial of service (BUG) by modifying a certain e_cpos field (bnc#1084831).
- CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674).
The following non-security bugs were fixed:
- acpi, nfit: Prefer _DSM over _LSR for namespace label reads (bsc#112128).
- acpi / processor: Fix the return value of acpi_processor_ids_walk() (bsc#1051510).
- aio: fix io_destroy(2) vs. lookup_ioctx() race (git-fixes).
- alsa: hda: Add 2 more models to the power_save blacklist (bsc#1051510).
- alsa: hda - Add mic quirk for the Lenovo G50-30 (17aa:3905) (bsc#1051510).
- alsa: hda - Add quirk for ASUS G751 laptop (bsc#1051510).
- alsa: hda - Fix headphone pin config for ASUS G751 (bsc#1051510).
- alsa: hda: fix unused variable warning (bsc#1051510).
- alsa: hda/realtek - Cannot adjust speaker's volume on Dell XPS 27 7760 (bsc#1051510).
- alsa: hda/realtek - Fix the problem of the front MIC on the Lenovo M715 (bsc#1051510).
- alsa: usb-audio: update quirk for B&W PX to remove microphone (bsc#1051510).
- apparmor: Check buffer bounds when mapping permissions mask (git-fixes).
- ARM: bcm2835: Add GET_THROTTLED firmware property (bsc#1108468).
- ASoC: intel: skylake: Add missing break in skl_tplg_get_token() (bsc#1051510).
- ASoC: Intel: Skylake: Reset the controller in probe (bsc#1051510).
- ASoC: rsnd: adg: care clock-frequency size (bsc#1051510).
- ASoC: rsnd: do not fallback to PIO mode when -EPROBE_DEFER (bsc#1051510).
- ASoC: rt5514: Fix the issue of the delay volume applied again (bsc#1051510).
- ASoC: sigmadsp: safeload should not have lower byte limit (bsc#1051510).
- ASoC: wm8804: Add ACPI support (bsc#1051510).
- ath10k: fix kernel panic issue during pci probe (bsc#1051510).
- ath10k: fix scan crash due to incorrect length calculation (bsc#1051510).
- ath10k: fix use-after-free in ath10k_wmi_cmd_send_nowait (bsc#1051510).
- autofs: fix autofs_sbi() does not check super block type (git-fixes).
- autofs: fix slab out of bounds read in getname_kernel() (git-fixes).
- autofs: mount point create should honour passed in mode (git-fixes).
- badblocks: fix wrong return value in badblocks_set if badblocks are disabled (git-fixes).
- batman-adv: Avoid probe ELP information leak (bsc#1051510).
- batman-adv: fix backbone_gw refcount on queue_work() failure (bsc#1051510).
- batman-adv: fix hardif_neigh refcount on queue_work() failure (bsc#1051510).
- bdi: Fix another oops in wb_workfn() (bsc#1112746).
- bdi: Preserve kabi when adding cgwb_release_mutex (bsc#1112746).
- blkdev_report_zones_ioctl(): Use vmalloc() to allocate large buffers (bsc#1111819).
- blk-mq: I/O and timer unplugs are inverted in blktrace (bsc#1112713).
- block, bfq: fix wrong init of saved start time for weight raising (bsc#1112708).
- block: bfq: swap puts in bfqg_and_blkg_put (bsc#1112712).
- block: bvec_nr_vecs() returns value for wrong slab (bsc#1111834).
- bpf/verifier: disallow pointer subtraction (bsc#1083647).
- btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667).
- btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).
- btrfs: fix file data corruption after cloning a range and fsync (bsc#1111901).
- btrfs: fix missing error return in btrfs_drop_snapshot (Git-fixes bsc#1109919).
- btrfs: fix mount failure after fsync due to hard link recreation (bsc#1103543).
- btrfs: handle errors while updating refcounts in update_ref_for_cow (Git-fixes bsc#1109915).
- btrfs: send, fix invalid access to commit roots due to concurrent snapshotting (bsc#1111904).
- cdc-acm: fix race between reset and control messaging (bsc#1051510).
- ceph: avoid a use-after-free in ceph_destroy_options() (bsc#1111983).
- cfg80211: fix a type issue in ieee80211_chandef_to_operating_class() (bsc#1051510).
- cifs: check for STATUS_USER_SESSION_DELETED (bsc#1112902).
- cifs: check for STATUS_USER_SESSION_DELETED (bsc#1112902).
- cifs: connect to servername instead of IP for IPC$ share (bsc#1106359).
- cifs: fix memory leak in SMB2_open() (bsc#1112894).
- cifs: fix memory leak in SMB2_open() (bsc#1112894).
- cifs: Fix use after free of a mid_q_entry (bsc#1112903).
- cifs: Fix use after free of a mid_q_entry (bsc#1112903).
- clk: x86: add 'ether_clk' alias for Bay Trail / Cherry Trail (bsc#1051510).
- clk: x86: Stop marking clocks as CLK_IS_CRITICAL (bsc#1051510).
- clocksource/drivers/ti-32k: Add CLOCK_SOURCE_SUSPEND_NONSTOP flag for non-am43 SoCs (bsc#1051510).
- clocksource/drivers/timer-atmel-pit: Properly handle error cases (bsc#1051510).
- coda: fix 'kernel memory exposure attempt' in fsync (bsc#1051510).
- crypto: caam - fix implicit casts in endianness helpers (bsc#1051510).
- crypto: ccp - add timeout support in the SEV command (bsc#1106838).
- crypto: chelsio - Fix memory corruption in DMA Mapped buffers (bsc#1051510).
- crypto: lrw - Fix out-of bounds access on counter overflow (bsc#1051510).
- crypto: mxs-dcp - Fix wait logic on chan threads (bsc#1051510).
- crypto: qat - Fix KASAN stack-out-of-bounds bug in adf_probe() (bsc#1051510).
- crypto: tcrypt - fix ghash-generic speed test (bsc#1051510).
- dax: Fix deadlock in dax_lock_mapping_entry() (bsc#1109951).
- debugobjects: Make stack check warning more informative (bsc#1051510).
- Disable DRM patches that broke vbox video driver KMP (bsc#1111076)
- Documentation/l1tf: Fix small spelling typo (bsc#1051510).
- do d_instantiate/unlock_new_inode combinations safely (git-fixes).
- Do not leak MNT_INTERNAL away from internal mounts (git-fixes).
- drm/amdgpu: add another ATPX quirk for TOPAZ (bsc#1051510).
- drm/amdgpu: fix error handling in amdgpu_cs_user_fence_chunk (bsc#1106110)
- drm/amdgpu: Fix SDMA HQD destroy error on gfx_v7 (bsc#1051510).
- drm/amdgpu: Fix vce work queue was not cancelled when suspend (bsc#1106110)
- drm/amdgpu/powerplay: fix missing break in switch statements (bsc#1113722)
- drm/amdgpu: Pulling old prepare and submit for flip back (bsc#1051510).
- drm/amdgpu: revert 'fix deadlock of reservation between cs and gpu reset v2' (bsc#1051510).
- drm/edid: VSDB yCBCr420 Deep Color mode bit definitions (bsc#1051510).
- drm/hisilicon: hibmc: Do not carry error code in HiBMC framebuffer (bsc#1113722)
- drm/hisilicon: hibmc: Do not overwrite fb helper surface depth (bsc#1113722)
- drm/i915/audio: Hook up component bindings even if displays are (bsc#1113722)
- drm/i915/dp: Link train Fallback on eDP only if fallback link BW can fit panel's native mode (bsc#1051510).
- drm/i915/gen9+: Fix initial readout for Y tiled framebuffers (bsc#1113722)
- drm/i915/glk: Add Quirk for GLK NUC HDMI port issues (bsc#1051510).
- drm/i915: Restore vblank interrupts earlier (bsc#1051510).
- drm: mali-dp: Call drm_crtc_vblank_reset on device init (bsc#1051510).
- drm/mediatek: fix OF sibling-node lookup (bsc#1106110)
- drm/msm: fix OF child-node lookup (bsc#1106110)
- drm/nouveau/disp: fix DP disable race (bsc#1051510).
- drm/nouveau: Do not disable polling in fallback mode (bsc#1103356).
- drm/nouveau/TBDdevinit: do not fail when PMU/PRE_OS is missing from VBIOS (bsc#1051510).
- drm/sti: do not remove the drm_bridge that was never added (bsc#1100132)
- drm/sun4i: Fix an ulong overflow in the dotclock driver (bsc#1106110)
- drm/virtio: fix bounds check in virtio_gpu_cmd_get_capset() (bsc#1113722)
- e1000: check on netif_running() before calling e1000_up() (bsc#1051510).
- e1000: ensure to free old tx/rx rings in set_ringparam() (bsc#1051510).
- edac: Raise the maximum number of memory controllers (bsc#1113780).
- edac, thunderx: Fix memory leak in thunderx_l2c_threaded_isr() (bsc#1114279).
- eeprom: at24: change nvmem stride to 1 (bsc#1051510).
- eeprom: at24: check at24_read/write arguments (bsc#1051510).
- eeprom: at24: correctly set the size for at24mac402 (bsc#1051510).
- enic: do not call enic_change_mtu in enic_probe (bsc#1051510).
- enic: handle mtu change for vf properly (bsc#1051510).
- enic: initialize enic->rfs_h.lock in enic_probe (bsc#1051510).
- ethtool: fix a privilege escalation bug (bsc#1076830).
- ext2, dax: set ext2_dax_aops for dax files (bsc#1112554).
- ext4: avoid arithemetic overflow that can trigger a BUG (bsc#1112736).
- ext4: avoid divide by zero fault when deleting corrupted inline directories (bsc#1112735).
- ext4: check for NUL characters in extended attribute's name (bsc#1112732).
- ext4: check to make sure the rename(2)'s destination is not freed (bsc#1112734).
- ext4: do not mark mmp buffer head dirty (bsc#1112743).
- ext4: fix online resize's handling of a too-small final block group (bsc#1112739).
- ext4: fix online resizing for bigalloc file systems with a 1k block size (bsc#1112740).
- ext4: fix spectre gadget in ext4_mb_regular_allocator() (bsc#1112733).
- ext4: recalucate superblock checksum after updating free blocks/inodes (bsc#1112738).
- ext4: reset error code in ext4_find_entry in fallback (bsc#1112731).
- ext4: show test_dummy_encryption mount option in /proc/mounts (bsc#1112741).
- fbdev/omapfb: fix omapfb_memory_read infoleak (bsc#1051510).
- firmware: raspberrypi: Register hwmon driver (bsc#1108468).
- floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl (bsc#1051510).
- fs: dcache: Avoid livelock between d_alloc_parallel and __d_add (git-fixes).
- fs/dcache.c: fix kmemcheck splat at take_dentry_name_snapshot() (git-fixes).
- fs: dcache: Use READ_ONCE when accessing i_dir_seq (git-fixes).
- fs/quota: Fix spectre gadget in do_quotactl (bsc#1112745).
- getname_kernel() needs to make sure that ->name != ->iname in long case (git-fixes).
- gpio: adp5588: Fix sleep-in-atomic-context bug (bsc#1051510).
- gpio: Fix crash due to registration race (bsc#1051510).
- gpiolib-acpi: Register GpioInt ACPI event handlers from a late_initcall (bsc#1051510).
- gpio: mb86s70: Revert 'Return error if requesting an already assigned gpio' (bsc#1051510).
- hfsplus: do not return 0 when fill_super() failed (bsc#1051510).
- hfsplus: stop workqueue when fill_super() failed (bsc#1051510).
- hfs: prevent crash on exit from failed search (bsc#1051510).
- hid: add support for Apple Magic Keyboards (bsc#1051510).
- hid: hid-saitek: Add device ID for RAT 7 Contagion (bsc#1051510).
- hid: hid-sensor-hub: Force logical minimum to 1 for power and report state (bsc#1051510).
- hid: quirks: fix support for Apple Magic Keyboards (bsc#1051510).
- hid: sensor-hub: Restore fixup for Lenovo ThinkPad Helix 2 sensor hub report (bsc#1051510).
- hv: avoid crash in vmbus sysfs files (bnc#1108377).
- hv_netvsc: Fix a deadlock by getting rtnl lock earlier in netvsc_probe() (bsc#1109772).
- hv_netvsc: fix schedule in RCU context ().
- hwmon: Add support for RPi voltage sensor (bsc#1108468).
- hwmon: (adt7475) Make adt7475_read_word() return errors (bsc#1051510).
- hwmon: (ina2xx) fix sysfs shunt resistor read access (bsc#1051510).
- hwmon: rpi: add module alias to raspberrypi-hwmon (bsc#1108468).
- hwrng: core - document the quality field (bsc#1051510).
- hypfs_kill_super(): deal with failed allocations (bsc#1051510).
- i2c: i2c-scmi: fix for i2c_smbus_write_block_data (bsc#1051510).
- i2c: rcar: cleanup DMA for all kinds of failure (bsc#1051510).
- iio: adc: at91: fix acking DRDY irq on simple conversions (bsc#1051510).
- iio: adc: at91: fix wrong channel number in triggered buffer mode (bsc#1051510).
- iio: adc: imx25-gcq: Fix leak of device_node in mx25_gcq_setup_cfgs() (bsc#1051510).
- Input: atakbd - fix Atari CapsLock behaviour (bsc#1051510).
- Input: atakbd - fix Atari keymap (bsc#1051510).
- intel_th: pci: Add Ice Lake PCH support (bsc#1051510).
- iommu/arm-smmu: Error out only if not enough context interrupts (bsc#1106237).
- iommu/vt-d: Add definitions for PFSID (bsc#1106237).
- iommu/vt-d: Fix dev iotlb pfsid use (bsc#1106237).
- iommu/vt-d: Fix scatterlist offset handling (bsc#1106237).
- ipc/shm.c add ->pagesize function to shm_vm_ops (bsc#1111811).
- iwlwifi: dbg: do not crash if the firmware crashes in the middle of a debug dump (bsc#1051510).
- iwlwifi: mvm: Allow TKIP for AP mode (bsc#1051510).
- iwlwifi: mvm: check for n_profiles validity in EWRD ACPI (bsc#1051510).
- iwlwifi: mvm: clear HW_RESTART_REQUESTED when stopping the interface (bsc#1051510).
- iwlwifi: mvm: open BA session only when sta is authorized (bsc#1051510).
- iwlwifi: mvm: send BCAST management frames to the right station (bsc#1051510).
- iwlwifi: pcie: gen2: build A-MSDU only for GSO (bsc#1051510).
- iwlwifi: pcie gen2: check iwl_pcie_gen2_set_tb() return value (bsc#1051510).
- jbd2: fix use after free in jbd2_log_do_checkpoint() (bsc#1113257).
- kABI: Hide get_msr_feature() in kvm_x86_ops (bsc#1106240).
- KABI: hide new member in struct iommu_table from genksyms (bsc#1061840).
- KABI: powerpc: export __find_linux_pte as __find_linux_pte_or_hugepte (bsc#1061840).
- kabi/severities: correct nvdimm kabi exclusion
- kabi/severities: ignore ppc64 realmode helpers. KVM fixes remove exports of realmode_pfn_to_page iommu_tce_xchg_rm mm_iommu_lookup_rm mm_iommu_ua_to_hpa_rm. Some are no longer used and others are no longer exported because the code was consolideted in one place. These helpers are to be called in realmode and linking to them from non-KVM modules is a bug. Hence removing them does not break KABI.
- kabi/severities: ignore __xive_vm_h_* KVM internal symbols.
- Kbuild: fix # escaping in .cmd files for future Make (git-fixes).
- kernfs: update comment about kernfs_path() return value (bsc#1051510).
- kprobes/x86: Fix %p uses in error messages (bsc#1110006).
- ksm: fix unlocked iteration over vmas in cmp_and_merge_page() (VM Functionality bsc#1111806).
- kvm: Make VM ioctl do valloc for some archs (bsc#1111506).
- KVM: PPC: Add pt_regs into kvm_vcpu_arch and move vcpu->arch.gpr[] into it (bsc#1061840).
- KVM: PPC: Avoid marking DMA-mapped pages dirty in real mode (bsc#1061840).
- KVM: PPC: Book3S: Add MMIO emulation for VMX instructions (bsc#1061840).
- KVM: PPC: Book3S: Allow backing bigger guest IOMMU pages with smaller physical pages (bsc#1061840).
- KVM: PPC: Book3S: Check KVM_CREATE_SPAPR_TCE_64 parameters (bsc#1061840).
- KVM: PPC: Book3S: Eliminate some unnecessary checks (bsc#1061840).
- KVM: PPC: Book3S: Fix compile error that occurs with some gcc versions (bsc#1061840).
- KVM: PPC: Book3S: Fix matching of hardware and emulated TCE tables (bsc#1061840).
- KVM: PPC: Book3S HV: Add of_node_put() in success path (bsc#1061840).
- KVM: PPC: Book3S HV: Add 'online' register to ONE_REG interface (bsc#1061840).
- KVM: PPC: Book3S HV: Allow creating max number of VCPUs on POWER9 (bsc#1061840).
- KVM: PPC: Book3S HV: Allow HPT and radix on the same core for POWER9 v2.2 (bsc#1061840).
- KVM: PPC: Book3S HV: Avoid crash from THP collapse during radix page fault (bsc#1061840).
- KVM: PPC: Book3S HV: Avoid shifts by negative amounts (bsc#1061840).
- KVM: PPC: Book3S HV: Check DR not IR to chose real vs virt mode MMIOs (bsc#1061840).
- KVM: PPC: Book3S HV: Do not truncate HPTE index in xlate function (bsc#1061840).
- KVM: PPC: Book3S HV: Do not use compound_order to determine host mapping size (bsc#1061840).
- KVM: PPC: Book3S HV: Do not use existing 'prodded' flag for XIVE escalations (bsc#1061840).
- KVM: PPC: Book 3S HV: Do ptesync in radix guest exit path (bsc#1061840).
- KVM: PPC: Book3S HV: Do SLB load/unload with guest LPCR value loaded (bsc#1061840).
- KVM: PPC: Book3S HV: Enable migration of decrementer register (bsc#1061840).
- KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm (bsc#1061840).
- KVM: PPC: Book3S HV: Fix conditions for starting vcpu (bsc#1061840).
- KVM: PPC: Book3S HV: Fix constant size warning (bsc#1061840).
- KVM: PPC: Book3S HV: Fix duplication of host SLB entries (bsc#1061840).
- KVM: PPC: Book3S HV: Fix guest r11 corruption with POWER9 TM workarounds (bsc#1061840).
- KVM: PPC: Book3S HV: Fix handling of large pages in radix page fault handler (bsc#1061840).
- KVM: PPC: Book3S HV: Fix handling of secondary HPTEG in HPT resizing code (bsc#1061840).
- KVM: PPC: Book3S HV: Fix inaccurate comment (bsc#1061840).
- KVM: PPC: Book3S HV: Fix kvmppc_bad_host_intr for real mode interrupts (bsc#1061840).
- KVM: PPC: Book3S HV: Fix trap number return from __kvmppc_vcore_entry (bsc#1061840).
- KVM: PPC: Book3S HV: Fix typo in kvmppc_hv_get_dirty_log_radix() (bsc#1061840).
- KVM: PPC: Book3S HV: Fix VRMA initialization with 2MB or 1GB memory backing (bsc#1061840).
- KVM: PPC: Book3S HV: Handle 1GB pages in radix page fault handler (bsc#1061840).
- KVM: PPC: Book3S HV: Improve handling of debug-trigger HMIs on POWER9 (bsc#1061840).
- KVM: PPC: Book3S HV: Keep XIVE escalation interrupt masked unless ceded (bsc#1061840).
- KVM: PPC: Book3S HV: Lockless tlbie for HPT hcalls (bsc#1061840).
- KVM: PPC: Book3S HV: Make HPT resizing work on POWER9 (bsc#1061840).
- KVM: PPC: Book3S HV: Make radix clear pte when unmapping (bsc#1061840).
- KVM: PPC: Book3S HV: Make radix use correct tlbie sequence in kvmppc_radix_tlbie_page (bsc#1061840).
- KVM: PPC: Book3S HV: Make xive_pushed a byte, not a word (bsc#1061840).
- KVM: PPC: Book3S HV: Pack VCORE IDs to access full VCPU ID space (bsc#1061840).
- KVM: PPC: Book3S HV: radix: Do not clear partition PTE when RC or write bits do not match (bsc#1061840).
- KVM: PPC: Book3S HV: Radix page fault handler optimizations (bsc#1061840).
- KVM: PPC: Book3S HV: radix: Refine IO region partition scope attributes (bsc#1061840).
- KVM: PPC: Book3S HV: Read kvm->arch.emul_smt_mode under kvm->lock (bsc#1061840).
- KVM: PPC: Book3S HV: Recursively unmap all page table entries when unmapping (bsc#1061840).
- KVM: PPC: Book3S HV: Remove useless statement (bsc#1061840).
- KVM: PPC: Book3S HV: Remove vcpu->arch.dec usage (bsc#1061840).
- KVM: PPC: Book3S HV: Send kvmppc_bad_interrupt NMIs to Linux handlers (bsc#1061840).
- KVM: PPC: Book3S HV: Set RWMR on POWER8 so PURR/SPURR count correctly (bsc#1061840).
- KVM: PPC: Book3S HV: Snapshot timebase offset on guest entry (bsc#1061840).
- KVM: PPC: Book3S HV: Streamline setting of reference and change bits (bsc#1061840).
- KVM: PPC: Book3S HV: Use a helper to unmap ptes in the radix fault path (bsc#1061840).
- KVM: PPC: Book3S HV: Use __gfn_to_pfn_memslot() in page fault handler (bsc#1061840).
- KVM: PPC: Book3S HV: XIVE: Resend re-routed interrupts on CPU priority change (bsc#1061840).
- KVM: PPC: Book3S PR: Add guest MSR parameter for kvmppc_save_tm()/kvmppc_restore_tm() (bsc#1061840).
- KVM: PPC: Book3S PR: Move kvmppc_save_tm/kvmppc_restore_tm to separate file (bsc#1061840).
- KVM: PPC: Book3S: Use correct page shift in H_STUFF_TCE (bsc#1061840).
- KVM: PPC: Fix a mmio_host_swabbed uninitialized usage issue (bsc#1061840).
- KVM: PPC: Make iommu_table::it_userspace big endian (bsc#1061840).
- KVM: PPC: Move nip/ctr/lr/xer registers to pt_regs in kvm_vcpu_arch (bsc#1061840).
- KVM: PPC: Use seq_puts() in kvmppc_exit_timing_show() (bsc#1061840).
- KVM: SVM: Add MSR-based feature support for serializing LFENCE (bsc#1106240).
- KVM: VMX: support MSR_IA32_ARCH_CAPABILITIES as a feature MSR (bsc#1106240).
- KVM: VMX: Tell the nested hypervisor to skip L1D flush on vmentry (bsc#1106240).
- KVM: x86: Add a framework for supporting MSR-based features (bsc#1106240).
- KVM: x86: define SVM/VMX specific kvm_arch_[alloc|free]_vm (bsc#1111506).
- KVM: X86: Introduce kvm_get_msr_feature() (bsc#1106240).
- kvm/x86: kABI fix for vm_alloc/vm_free changes (bsc#1111506).
- kvm: x86: Set highest physical address bits in non-present/reserved SPTEs (bsc#1106240).
- libertas: call into generic suspend code before turning off power (bsc#1051510).
- libnvdimm, badrange: remove a WARN for list_empty (bsc#112128).
- libnvdimm, dimm: Maximize label transfer size (bsc#1111921, bsc#1113408).
- libnvdimm, dimm: Maximize label transfer size (bsc#1111921, bsc#1113408, bsc#1113972).
- libnvdimm: Introduce locked DIMM capacity support (bsc#112128).
- libnvdimm, label: change nvdimm_num_label_slots per UEFI 2.7 (bsc#1111921, bsc#1113408).
- libnvdimm, label: change nvdimm_num_label_slots per UEFI 2.7 (bsc#1111921, bsc#1113408, bsc#1113972).
- libnvdimm, label: Fix sparse warning (bsc#1111921, bsc#1113408, ).
- libnvdimm, label: Fix sparse warning (bsc#1111921, bsc#1113408, bsc#1113972).
- libnvdimm: move poison list functions to a new 'badrange' file (bsc#112128).
- libnvdimm/nfit_test: add firmware download emulation (bsc#112128).
- libnvdimm/nfit_test: adding support for unit testing enable LSS status (bsc#112128).
- libnvdimm, testing: Add emulation for smart injection commands (bsc#112128).
- libnvdimm, testing: update the default smart ctrl_temperature (bsc#112128).
- lib/ubsan: add type mismatch handler for new GCC/Clang (bsc#1051510).
- lib/ubsan.c: s/missaligned/misaligned/ (bsc#1051510).
- livepatch: create and include UAPI headers ().
- lockd: fix 'list_add double add' caused by legacy signal interface (git-fixes).
- loop: add recursion validation to LOOP_CHANGE_FD (bsc#1112711).
- loop: do not call into filesystem while holding lo_ctl_mutex (bsc#1112710).
- loop: fix LOOP_GET_STATUS lock imbalance (bsc#1113284).
- mac80211: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bsc#1051510).
- mac80211: do not convert to A-MSDU if frag/subframe limited (bsc#1051510).
- mac80211: do not Tx a deauth frame if the AP forbade Tx (bsc#1051510).
- mac80211: fix a race between restart and CSA flows (bsc#1051510).
- mac80211: Fix station bandwidth setting after channel switch (bsc#1051510).
- mac80211_hwsim: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bsc#1051510).
- mac80211_hwsim: require at least one channel (bsc#1051510).
- mac80211: mesh: fix HWMP sequence numbering to follow standard (bsc#1051510).
- mac80211: minstrel: fix using short preamble CCK rates on HT clients (bsc#1051510).
- mac80211: Run TXQ teardown code before de-registering interfaces (bsc#1051510).
- mac80211: shorten the IBSS debug messages (bsc#1051510).
- mach64: detect the dot clock divider correctly on sparc (bsc#1051510).
- make sure that __dentry_kill() always invalidates d_seq, unhashed or not (git-fixes).
- md: fix NULL dereference of mddev->pers in remove_and_add_spares() (git-fixes).
- md/raid10: fix that replacement cannot complete recovery after reassemble (git-fixes).
- md/raid1: add error handling of read error from FailFast device (git-fixes).
- md/raid5-cache: disable reshape completely (git-fixes).
- md/raid5: fix data corruption of replacements after originals dropped (git-fixes).
- media: af9035: prevent buffer overflow on write (bsc#1051510).
- media: cx231xx: fix potential sign-extension overflow on large shift (bsc#1051510).
- media: dvb: fix compat ioctl translation (bsc#1051510).
- media: em28xx: fix input name for Terratec AV 350 (bsc#1051510).
- media: em28xx: use a default format if TRY_FMT fails (bsc#1051510).
- media: pci: cx23885: handle adding to list failure (bsc#1051510).
- media: tvp5150: avoid going past array on v4l2_querymenu() (bsc#1051510).
- media: tvp5150: fix switch exit in set control handler (bsc#1051510).
- media: tvp5150: fix width alignment during set_selection() (bsc#1051510).
- media: uvcvideo: Fix uvc_alloc_entity() allocation alignment (bsc#1051510).
- media: v4l2-tpg: fix kernel oops when enabling HFLIP and OSD (bsc#1051510).
- media: videobuf-dma-sg: Fix dma_{sync,unmap}_sg() calls (bsc#1051510).
- media: vsp1: Fix YCbCr planar formats pitch calculation (bsc#1051510).
- mfd: arizona: Correct calling of runtime_put_sync (bsc#1051510).
- mmc: block: avoid multiblock reads for the last sector in SPI mode (bsc#1051510).
- mm: fix BUG_ON() in vmf_insert_pfn_pud() from VM_MIXEDMAP removal (bsc#1111841).
- mm/migrate: Use spin_trylock() while resetting rate limit ().
- mm: /proc/pid/pagemap: hide swap entries from unprivileged users (Git-fixes bsc#1109907).
- modpost: ignore livepatch unresolved relocations ().
- move changes without Git-commit out of sorted section
- mwifiex: handle race during mwifiex_usb_disconnect (bsc#1051510).
- net/smc: retain old name for diag_mode field (bsc#1106287, LTC#170892).
- net/smc: use __aligned_u64 for 64-bit smc_diag fields (bsc#1101138, LTC#164002).
- NFC: nfcmrvl_uart: fix OF child-node lookup (bsc#1051510).
- nfit_test: add error injection DSMs (bsc#112128).
- nfit_test: fix buffer overrun, add sanity check (bsc#112128).
- nfit_test: improve structure offset handling (bsc#112128).
- nfit_test: prevent parsing error of nfit_test.0 (bsc#112128).
- nfit_test: when clearing poison, also remove badrange entries (bsc#112128).
- NFS: Avoid quadratic search when freeing delegations (bsc#1084760).
- nvdimm: Clarify comment in sizeof_namespace_index (bsc#1111921, bsc#1113408).
- nvdimm: Clarify comment in sizeof_namespace_index (bsc#1111921, bsc#1113408, bsc#1113972).
- nvdimm: Remove empty if statement (bsc#1111921, bsc#1113408, ).
- nvdimm: Remove empty if statement (bsc#1111921, bsc#1113408, bsc#1113972).
- nvdimm: Sanity check labeloff (bsc#1111921, bsc#1113408, ).
- nvdimm: Sanity check labeloff (bsc#1111921, bsc#1113408, bsc#1113972).
- nvdimm: Split label init out from the logic for getting config data (bsc#1111921, bsc#1113408).
- nvdimm: Split label init out from the logic for getting config data (bsc#1111921, bsc#1113408, bsc#1113972).
- nvdimm: Use namespace index data to reduce number of label reads needed (bsc#1111921, bsc#1113408).
- nvdimm: Use namespace index data to reduce number of label reads needed (bsc#1111921, bsc#1113408, bsc#1113972).
- of: add helper to lookup compatible child node (bsc#1106110)
- orangefs: fix deadlock; do not write i_size in read_iter (bsc#1051510).
- orangefs: initialize op on loop restart in orangefs_devreq_read (bsc#1051510).
- orangefs_kill_sb(): deal with allocation failures (bsc#1051510).
- orangefs: use list_for_each_entry_safe in purge_waiting_ops (bsc#1051510).
- ovl: fix format of setxattr debug (git-fixes).
- ovl: Sync upper dirty data when syncing overlayfs (git-fixes).
- PCI/ASPM: Fix link_state teardown on device removal (bsc#1051510).
- PCI: hv: Do not wait forever on a device that has disappeared (bsc#1109806).
- PCI: hv: Use effective affinity mask (bsc#1109772).
- PCI: Reprogram bridge prefetch registers on resume (bsc#1051510).
- pipe: match pipe_max_size data type with procfs (git-fixes).
- PM / Domains: Fix genpd to deal with drivers returning 1 from ->prepare() (bsc#1051510).
- powerpc/kvm/booke: Fix altivec related build break (bsc#1061840).
- powerpc/kvm: Switch kvm pmd allocator to custom allocator (bsc#1061840).
- powerpc/mm/hugetlb: initialize the pagetable cache correctly for hugetlb (bsc#1091800).
- powerpc/mm: Rename find_linux_pte_or_hugepte() (bsc#1061840).
- powerpc/numa: Skip onlining a offline node in kdump path (bsc#1109784).
- powerpc/powernv: Add indirect levels to it_userspace (bsc#1061840).
- powerpc/powernv/ioda2: Reduce upper limit for DMA window size (bsc#1055120).
- powerpc/powernv/ioda: Allocate indirect TCE levels on demand (bsc#1061840).
- powerpc/powernv/ioda: Finish removing explicit max window size check (bsc#1061840).
- powerpc/powernv/ioda: Remove explicit max window size check (bsc#1061840).
- powerpc/powernv: Move TCE manupulation code to its own file (bsc#1061840).
- powerpc/powernv: Rework TCE level allocation (bsc#1061840).
- powerpc/pseries: Fix build break for SPLPAR=n and CPU hotplug (bsc#1079524, git-fixes).
- powerpc/pseries: Fix CONFIG_NUMA=n build (bsc#1067906, git-fixes).
- powerpc/pseries: Fix 'OF: ERROR: Bad of_node_put() on /cpus' during DLPAR (bsc#1113295).
- powerpc: pseries: remove dlpar_attach_node dependency on full path (bsc#1113295).
- powerpc/rtas: Fix a potential race between CPU-Offline & Migration (bsc#1111870).
- powerpc/xive: Move definition of ESB bits (bsc#1061840).
- powerpc/xmon: Add ISA v3.0 SPRs to SPR dump (bsc#1061840).
- printk: drop in_nmi check from printk_safe_flush_on_panic() (bsc#1112170).
- printk/tracing: Do not trace printk_nmi_enter() (bsc#1112208).
- proc: restrict kernel stack dumps to root (git-fixes). blacklist.conf:
- qmi_wwan: Added support for Gemalto's Cinterion ALASxx WWAN interface (bsc#1051510).
- qrtr: add MODULE_ALIAS macro to smd (bsc#1051510).
- r8169: Clear RTL_FLAG_TASK_*_PENDING when clearing RTL_FLAG_TASK_ENABLED (bsc#1051510).
- race of lockd inetaddr notifiers vs nlmsvc_rqst change (git-fixes).
- RAID10 BUG_ON in raise_barrier when force is true and conf->barrier is 0 (git-fixes).
- random: rate limit unseeded randomness warnings (git-fixes).
- rculist: add list_for_each_entry_from_rcu() (bsc#1084760).
- rculist: Improve documentation for list_for_each_entry_from_rcu() (bsc#1084760).
- reiserfs: add check to detect corrupted directory entry (bsc#1109818).
- reiserfs: do not panic on bad directory entries (bsc#1109818).
- rename a hv patch to reduce conflicts in -AZURE
- reorder a qedi patch to allow further work in this branch
- resource: Include resource end in walk_*() interfaces (bsc#1114279).
- Revert 'drm/amdgpu: Add an ATPX quirk for hybrid laptop' (bsc#1051510).
- Revert 'drm/i915/gvt: set max priority for gvt context' (bsc#1051510).
- Revert 'gpio: set up initial state from .get_direction()' (bsc#1051510).
- Revert 'iommu/io-pgtable: Avoid redundant TLB syncs' (bsc#1106237).
- Revert 'mwifiex: fix incorrect ht capability problem' (bsc#1051510).
- Revert 'mwifiex: handle race during mwifiex_usb_disconnect' (bsc#1051510).
- Revert 'pinctrl: sunxi: Do not enforce bias disable (for now)' (bsc#1051510).
- rpc_pipefs: fix double-dput() (bsc#1051510).
- rpmsg: Correct support for MODULE_DEVICE_TABLE() (git-fixes).
- sched/numa: Limit the conditions where scan period is reset ().
- scripts/series2git:
- scripts/series2git: Revert the change mistakenly taken A 'fix' for series2git went in mistakenly among other patches. Revert it here. It'll be picked up from a proper branch if need.
- scsi: core: Allow state transitions from OFFLINE to BLOCKED (bsc#1112246).
- scsi: core: Allow state transitions from OFFLINE to BLOCKED (bsc#1112246).
- scsi: ipr: Eliminate duplicate barriers ().
- scsi: ipr: fix incorrect indentation of assignment statement ().
- scsi: ipr: Use dma_pool_zalloc() ().
- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1104731).
- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1104731).
- scsi: libfc: retry PRLI if we cannot analyse the payload (bsc#1104731).
- scsi: libfc: retry PRLI if we cannot analyse the payload (bsc#1104731).
- scsi: qla2xxx: do not allow negative thresholds (bsc#1108870).
- scsi: qla2xxx: Fix driver hang when FC-NVMe LUNs are configured (bsc#1108870).
- scsi: qla2xxx: Fix duplicate switch database entries (bsc#1108870).
- scsi: qla2xxx: Fix for double free of SRB structure (bsc#1108870).
- scsi: qla2xxx: Fix memory leak for allocating abort IOCB (bsc#1111830).
- scsi: qla2xxx: Fix NVMe session hang on unload (bsc#1108870).
- scsi: qla2xxx: Fix NVMe Target discovery (bsc#1108870).
- scsi: qla2xxx: Fix recursive mailbox timeout (bsc#1108870).
- scsi: qla2xxx: Fix re-using LoopID when handle is in use (bsc#1108870).
- scsi: qla2xxx: Move log messages before issuing command to firmware (bsc#1108870).
- scsi: qla2xxx: Return switch command on a timeout (bsc#1108870).
- scsi: target: prefer dbroot of /etc/target over /var/target (bsc#1111928).
- serial: 8250: Fix clearing FIFOs in RS485 mode again (bsc#1051510).
- signal: Properly deliver SIGSEGV from x86 uprobes (bsc#1110006).
- smb2: fix missing files in root share directory listing (bsc#1112907).
- smb2: fix missing files in root share directory listing (bsc#1112907).
- smb3: fill in statfs fsid and correct namelen (bsc#1112905).
- smb3: fill in statfs fsid and correct namelen (bsc#1112905).
- smb3: fix reset of bytes read and written stats (bsc#1112906).
- smb3: fix reset of bytes read and written stats (bsc#1112906).
- smb3: on reconnect set PreviousSessionId field (bsc#1112899).
- smb3: on reconnect set PreviousSessionId field (bsc#1112899).
- sock_diag: fix use-after-free read in __sk_free (bsc#1051510).
- soc/tegra: pmc: Fix child-node lookup (bsc#1051510).
- soreuseport: initialise timewait reuseport field (bsc#1051510).
- sound: do not call skl_init_chip() to reset intel skl soc (bsc#1051510).
- sound: enable interrupt after dma buffer initialization (bsc#1051510).
- spi/bcm63xx-hsspi: keep pll clk enabled (bsc#1051510).
- spi: bcm-qspi: switch back to reading flash using smaller chunks (bsc#1051510).
- spi: sh-msiof: fix deferred probing (bsc#1051510).
- squashfs: be more careful about metadata corruption (bsc#1051510).
- Squashfs: Compute expected length from inode size rather than block length (bsc#1051510).
- squashfs metadata 2: electric boogaloo (bsc#1051510).
- squashfs: more metadata hardening (bsc#1051510).
- squashfs: more metadata hardening (bsc#1051510).
- staging: comedi: ni_mio_common: protect register write overflow (bsc#1051510).
- stm: Potential read overflow in stm_char_policy_set_ioctl() (bsc#1051510).
- supported.conf: mark raspberrypi-hwmon as supported
- switchtec: Fix Spectre v1 vulnerability (bsc#1051510).
- sysfs: Do not return POSIX ACL xattrs via listxattr (git-fixes).
- target: log Data-Out timeouts as errors (bsc#1095805).
- target: log NOP ping timeouts as errors (bsc#1095805).
- target: split out helper for cxn timeout error stashing (bsc#1095805).
- target: stash sess_err_stats on Data-Out timeout (bsc#1095805).
- target: use ISCSI_IQN_LEN in iscsi_target_stat (bsc#1095805).
- team: Forbid enslaving team device to itself (bsc#1051510).
- tools build: fix # escaping in .cmd files for future Make (git-fixes).
- tools/testing/nvdimm: advertise a write cache for nfit_test (bsc#112128).
- tools/testing/nvdimm: allow custom error code injection (bsc#112128).
- tools/testing/nvdimm: disable labels for nfit_test.1 (bsc#112128).
- tools/testing/nvdimm: enable labels for nfit_test.1 dimms (bsc#112128).
- tools/testing/nvdimm: fix missing newline in nfit_test_dimm 'handle' attribute (bsc#112128).
- tools/testing/nvdimm: Fix support for emulating controller temperature (bsc#112128).
- tools/testing/nvdimm: force nfit_test to depend on instrumented modules (bsc#112128).
- tools/testing/nvdimm: improve emulation of smart injection (bsc#112128).
- tools/testing/nvdimm: kaddr and pfn can be NULL to ->direct_access() (bsc#112128).
- tools/testing/nvdimm: Make DSM failure code injection an override (bsc#112128).
- tools/testing/nvdimm: smart alarm/threshold control (bsc#112128).
- tools/testing/nvdimm: stricter bounds checking for error injection commands (bsc#112128).
- tools/testing/nvdimm: support nfit_test_dimm attributes under nfit_test.1 (bsc#112128).
- tools/testing/nvdimm: unit test clear-error commands (bsc#112128).
- tools/vm/page-types.c: fix 'defined but not used' warning (bsc#1051510).
- tools/vm/slabinfo.c: fix sign-compare warning (bsc#1051510).
- tracing: Add barrier to trace_printk() buffer nesting modification (bsc#1112219).
- tty: Do not block on IO when ldisc change is pending (bnc#1105428).
- tty: fix data race between tty_init_dev and flush of buf (bnc#1105428).
- tty: Hold tty_ldisc_lock() during tty_reopen() (bnc#1105428).
- tty/ldsem: Add lockdep asserts for ldisc_sem (bnc#1105428).
- tty/ldsem: Convert to regular lockdep annotations (bnc#1105428).
- tty/ldsem: Decrement wait_readers on timeouted down_read() (bnc#1105428).
- tty/ldsem: Wake up readers after timed out down_write() (bnc#1105428).
- tty: Simplify tty->count math in tty_reopen() (bnc#1105428).
- Update patches.arch/KVM-PPC-Book3S-HV-Snapshot-timebase-offset-on-guest-.patch (bsc#1061840, bsc#1086196).
- Update patches.arch/powerpc-powernv-ioda2-Reduce-upper-limit-for-DMA-win.patch (bsc#1061840, bsc#1055120).
- Update patches.fixes/0002-nfs41-do-not-return-ENOMEM-on-LAYOUTUNAVAILABLE.patch (git-fixes, bsc#1103925).
- Update patches.fixes/libnvdimm-dimm-maximize-label-transfer-size.patch (bsc#1111921, bsc#1113408, bsc#1113972).
- Update patches.fixes/libnvdimm-label-change-nvdimm_num_label_slots-per-uefi-2-7.patch (bsc#1111921, bsc#1113408, bsc#1113972).
- Update patches.fixes/libnvdimm-label-fix-sparse-warning.patch (bsc#1111921, bsc#1113408, bsc#1113972).
- Update patches.fixes/nvdimm-clarify-comment-in-sizeof_namespace_index.patch (bsc#1111921, bsc#1113408, bsc#1113972).
- Update patches.fixes/nvdimm-remove-empty-if-statement.patch (bsc#1111921, bsc#1113408, bsc#1113972).
- Update patches.fixes/nvdimm-sanity-check-labeloff.patch (bsc#1111921, bsc#1113408, bsc#1113972).
- Update patches.fixes/nvdimm-split-label-init-out-from-the-logic-for-getting-config-data.patch (bsc#1111921, bsc#1113408, bsc#1113972).
- Update patches.fixes/nvdimm-use-namespace-index-data-to-reduce-number-of-label-reads-needed.patch (bsc#1111921, bsc#1113408, bsc#1113972).
- usb: chipidea: Prevent unbalanced IRQ disable (bsc#1051510).
- usb: gadget: fotg210-udc: Fix memory leak of fotg210->ep[i] (bsc#1051510).
- usb: gadget: fsl_udc_core: check allocation return value and cleanup on failure (bsc#1051510).
- usb: gadget: fsl_udc_core: fixup struct_udc_setup documentation (bsc#1051510).
- usbip: tools: fix atoi() on non-null terminated string (bsc#1051510).
- USB: remove LPM management from usb_driver_claim_interface() (bsc#1051510).
- USB: serial: cypress_m8: fix interrupt-out transfer length (bsc#1051510).
- USB: serial: simple: add Motorola Tetra MTP6550 id (bsc#1051510).
- usb: xhci-mtk: resume USB3 roothub first (bsc#1051510).
- USB: yurex: Check for truncation in yurex_read() (bsc#1051510).
- userfaultfd: hugetlbfs: fix userfaultfd_huge_must_wait() pte access (bsc#1109739).
- use the new async probing feature for the hyperv drivers (bsc#1109772).
- Use upstream version of pci-hyperv patch (35a88a1)
- VFS: close race between getcwd() and d_move() (git-fixes).
- vfs: fix freeze protection in mnt_want_write_file() for overlayfs (git-fixes).
- vmbus: do not return values for uninitalized channels (bsc#1051510).
- vti4: Do not count header length twice on tunnel setup (bsc#1051510).
- vti6: fix PMTU caching and reporting on xmit (bsc#1051510).
- vti6: remove !skb->ignore_df check from vti6_xmit() (bsc#1051510).
- Workaround for mysterious NVMe breakage with i915 CFL (bsc#1111040).
- x86/acpi: Prevent X2APIC id 0xffffffff from being accounted (bsc#1110006).
- x86/boot/KASLR: Work around firmware bugs by excluding EFI_BOOT_SERVICES_* and EFI_LOADER_* from KASLR's choice (bnc#1112878).
- x86/boot: Move EISA setup to a separate file (bsc#1110006).
- x86/cpufeature: Add User-Mode Instruction Prevention definitions (bsc#1110006).
- x86/cpufeatures: Add Intel Total Memory Encryption cpufeature (bsc#1110006).
- x86/eisa: Add missing include (bsc#1110006).
- x86/EISA: Do not probe EISA bus for Xen PV guests (bsc#1110006).
- x86/fpu: Remove second definition of fpu in __fpu__restore_sig() (bsc#1110006).
- x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772).
- x86/kasan: Panic if there is not enough memory to boot (bsc#1110006).
- x86/kexec: Correct KEXEC_BACKUP_SRC_END off-by-one error (bsc#1114279).
- x86/MCE: Fix stack out-of-bounds write in mce-inject.c: Flags_read() (bsc#1110006).
- x86, nfit_test: Add unit test for memcpy_mcsafe() (bsc#112128).
- x86/paravirt: Fix some warning messages (bnc#1065600).
- x86/percpu: Fix this_cpu_read() (bsc#1110006).
- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bsc#1105536).
- x86/time: Correct the attribute on jiffies' definition (bsc#1110006).
- xen/gntdev: avoid out of bounds access in case of partial gntdev_mmap() (bnc#1065600).
- xen: Remove unnecessary BUG_ON from __unbind_from_irq() (bnc#1065600).
- xen-swiotlb: fix the check condition for xen_swiotlb_free_coherent (bnc#1065600).
- xfrm: use complete IPv6 addresses for hash (bsc#1109330).
- xfs: do not fail when converting shortform attr to long form during ATTR_REPLACE (bsc#1105025).
- xfs: do not fail when converting shortform attr to long form during ATTR_REPLACE (bsc#1105025).
- xhci: Add missing CAS workaround for Intel Sunrise Point xHCI (bsc#1051510).
- xhci: Do not print a warning when setting link state for disabled ports (bsc#1051510).
Patchnames
SUSE-SLE-SERVER-12-SP4-2018-2803
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\n\nThe SUSE Linux Enterprise 12 SP4 kernel for Azure was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).\n- CVE-2018-18445: Faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandled 32-bit right shifts (bnc#1112372).\n- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).\n- CVE-2017-18224: fs/ocfs2/aops.c omits use of a semaphore and consequently has a race condition for access to the extent tree during read operations in DIRECT mode, which allowed local users to cause a denial of service (BUG) by modifying a certain e_cpos field (bnc#1084831).\n- CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674).\n\nThe following non-security bugs were fixed:\n\n- acpi, nfit: Prefer _DSM over _LSR for namespace label reads (bsc#112128).\n- acpi / processor: Fix the return value of acpi_processor_ids_walk() (bsc#1051510).\n- aio: fix io_destroy(2) vs. lookup_ioctx() race (git-fixes).\n- alsa: hda: Add 2 more models to the power_save blacklist (bsc#1051510).\n- alsa: hda - Add mic quirk for the Lenovo G50-30 (17aa:3905) (bsc#1051510).\n- alsa: hda - Add quirk for ASUS G751 laptop (bsc#1051510).\n- alsa: hda - Fix headphone pin config for ASUS G751 (bsc#1051510).\n- alsa: hda: fix unused variable warning (bsc#1051510).\n- alsa: hda/realtek - Cannot adjust speaker's volume on Dell XPS 27 7760 (bsc#1051510).\n- alsa: hda/realtek - Fix the problem of the front MIC on the Lenovo M715 (bsc#1051510).\n- alsa: usb-audio: update quirk for B&W PX to remove microphone (bsc#1051510).\n- apparmor: Check buffer bounds when mapping permissions mask (git-fixes).\n- ARM: bcm2835: Add GET_THROTTLED firmware property (bsc#1108468).\n- ASoC: intel: skylake: Add missing break in skl_tplg_get_token() (bsc#1051510).\n- ASoC: Intel: Skylake: Reset the controller in probe (bsc#1051510).\n- ASoC: rsnd: adg: care clock-frequency size (bsc#1051510).\n- ASoC: rsnd: do not fallback to PIO mode when -EPROBE_DEFER (bsc#1051510).\n- ASoC: rt5514: Fix the issue of the delay volume applied again (bsc#1051510).\n- ASoC: sigmadsp: safeload should not have lower byte limit (bsc#1051510).\n- ASoC: wm8804: Add ACPI support (bsc#1051510).\n- ath10k: fix kernel panic issue during pci probe (bsc#1051510).\n- ath10k: fix scan crash due to incorrect length calculation (bsc#1051510).\n- ath10k: fix use-after-free in ath10k_wmi_cmd_send_nowait (bsc#1051510).\n- autofs: fix autofs_sbi() does not check super block type (git-fixes).\n- autofs: fix slab out of bounds read in getname_kernel() (git-fixes).\n- autofs: mount point create should honour passed in mode (git-fixes).\n- badblocks: fix wrong return value in badblocks_set if badblocks are disabled (git-fixes).\n- batman-adv: Avoid probe ELP information leak (bsc#1051510).\n- batman-adv: fix backbone_gw refcount on queue_work() failure (bsc#1051510).\n- batman-adv: fix hardif_neigh refcount on queue_work() failure (bsc#1051510).\n- bdi: Fix another oops in wb_workfn() (bsc#1112746).\n- bdi: Preserve kabi when adding cgwb_release_mutex (bsc#1112746).\n- blkdev_report_zones_ioctl(): Use vmalloc() to allocate large buffers (bsc#1111819).\n- blk-mq: I/O and timer unplugs are inverted in blktrace (bsc#1112713).\n- block, bfq: fix wrong init of saved start time for weight raising (bsc#1112708).\n- block: bfq: swap puts in bfqg_and_blkg_put (bsc#1112712).\n- block: bvec_nr_vecs() returns value for wrong slab (bsc#1111834).\n- bpf/verifier: disallow pointer subtraction (bsc#1083647).\n- btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667).\n- btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).\n- btrfs: fix file data corruption after cloning a range and fsync (bsc#1111901).\n- btrfs: fix missing error return in btrfs_drop_snapshot (Git-fixes bsc#1109919).\n- btrfs: fix mount failure after fsync due to hard link recreation (bsc#1103543).\n- btrfs: handle errors while updating refcounts in update_ref_for_cow (Git-fixes bsc#1109915).\n- btrfs: send, fix invalid access to commit roots due to concurrent snapshotting (bsc#1111904).\n- cdc-acm: fix race between reset and control messaging (bsc#1051510).\n- ceph: avoid a use-after-free in ceph_destroy_options() (bsc#1111983).\n- cfg80211: fix a type issue in ieee80211_chandef_to_operating_class() (bsc#1051510).\n- cifs: check for STATUS_USER_SESSION_DELETED (bsc#1112902).\n- cifs: check for STATUS_USER_SESSION_DELETED (bsc#1112902).\n- cifs: connect to servername instead of IP for IPC$ share (bsc#1106359).\n- cifs: fix memory leak in SMB2_open() (bsc#1112894).\n- cifs: fix memory leak in SMB2_open() (bsc#1112894).\n- cifs: Fix use after free of a mid_q_entry (bsc#1112903).\n- cifs: Fix use after free of a mid_q_entry (bsc#1112903).\n- clk: x86: add 'ether_clk' alias for Bay Trail / Cherry Trail (bsc#1051510).\n- clk: x86: Stop marking clocks as CLK_IS_CRITICAL (bsc#1051510).\n- clocksource/drivers/ti-32k: Add CLOCK_SOURCE_SUSPEND_NONSTOP flag for non-am43 SoCs (bsc#1051510).\n- clocksource/drivers/timer-atmel-pit: Properly handle error cases (bsc#1051510).\n- coda: fix 'kernel memory exposure attempt' in fsync (bsc#1051510).\n- crypto: caam - fix implicit casts in endianness helpers (bsc#1051510).\n- crypto: ccp - add timeout support in the SEV command (bsc#1106838).\n- crypto: chelsio - Fix memory corruption in DMA Mapped buffers (bsc#1051510).\n- crypto: lrw - Fix out-of bounds access on counter overflow (bsc#1051510).\n- crypto: mxs-dcp - Fix wait logic on chan threads (bsc#1051510).\n- crypto: qat - Fix KASAN stack-out-of-bounds bug in adf_probe() (bsc#1051510).\n- crypto: tcrypt - fix ghash-generic speed test (bsc#1051510).\n- dax: Fix deadlock in dax_lock_mapping_entry() (bsc#1109951).\n- debugobjects: Make stack check warning more informative (bsc#1051510).\n- Disable DRM patches that broke vbox video driver KMP (bsc#1111076)\n- Documentation/l1tf: Fix small spelling typo (bsc#1051510).\n- do d_instantiate/unlock_new_inode combinations safely (git-fixes).\n- Do not leak MNT_INTERNAL away from internal mounts (git-fixes).\n- drm/amdgpu: add another ATPX quirk for TOPAZ (bsc#1051510).\n- drm/amdgpu: fix error handling in amdgpu_cs_user_fence_chunk (bsc#1106110)\n- drm/amdgpu: Fix SDMA HQD destroy error on gfx_v7 (bsc#1051510).\n- drm/amdgpu: Fix vce work queue was not cancelled when suspend (bsc#1106110)\n- drm/amdgpu/powerplay: fix missing break in switch statements (bsc#1113722)\n- drm/amdgpu: Pulling old prepare and submit for flip back (bsc#1051510).\n- drm/amdgpu: revert 'fix deadlock of reservation between cs and gpu reset v2' (bsc#1051510).\n- drm/edid: VSDB yCBCr420 Deep Color mode bit definitions (bsc#1051510).\n- drm/hisilicon: hibmc: Do not carry error code in HiBMC framebuffer (bsc#1113722)\n- drm/hisilicon: hibmc: Do not overwrite fb helper surface depth (bsc#1113722)\n- drm/i915/audio: Hook up component bindings even if displays are (bsc#1113722)\n- drm/i915/dp: Link train Fallback on eDP only if fallback link BW can fit panel's native mode (bsc#1051510).\n- drm/i915/gen9+: Fix initial readout for Y tiled framebuffers (bsc#1113722)\n- drm/i915/glk: Add Quirk for GLK NUC HDMI port issues (bsc#1051510).\n- drm/i915: Restore vblank interrupts earlier (bsc#1051510).\n- drm: mali-dp: Call drm_crtc_vblank_reset on device init (bsc#1051510).\n- drm/mediatek: fix OF sibling-node lookup (bsc#1106110)\n- drm/msm: fix OF child-node lookup (bsc#1106110)\n- drm/nouveau/disp: fix DP disable race (bsc#1051510).\n- drm/nouveau: Do not disable polling in fallback mode (bsc#1103356).\n- drm/nouveau/TBDdevinit: do not fail when PMU/PRE_OS is missing from VBIOS (bsc#1051510).\n- drm/sti: do not remove the drm_bridge that was never added (bsc#1100132)\n- drm/sun4i: Fix an ulong overflow in the dotclock driver (bsc#1106110)\n- drm/virtio: fix bounds check in virtio_gpu_cmd_get_capset() (bsc#1113722)\n- e1000: check on netif_running() before calling e1000_up() (bsc#1051510).\n- e1000: ensure to free old tx/rx rings in set_ringparam() (bsc#1051510).\n- edac: Raise the maximum number of memory controllers (bsc#1113780).\n- edac, thunderx: Fix memory leak in thunderx_l2c_threaded_isr() (bsc#1114279).\n- eeprom: at24: change nvmem stride to 1 (bsc#1051510).\n- eeprom: at24: check at24_read/write arguments (bsc#1051510).\n- eeprom: at24: correctly set the size for at24mac402 (bsc#1051510).\n- enic: do not call enic_change_mtu in enic_probe (bsc#1051510).\n- enic: handle mtu change for vf properly (bsc#1051510).\n- enic: initialize enic->rfs_h.lock in enic_probe (bsc#1051510).\n- ethtool: fix a privilege escalation bug (bsc#1076830).\n- ext2, dax: set ext2_dax_aops for dax files (bsc#1112554).\n- ext4: avoid arithemetic overflow that can trigger a BUG (bsc#1112736).\n- ext4: avoid divide by zero fault when deleting corrupted inline directories (bsc#1112735).\n- ext4: check for NUL characters in extended attribute's name (bsc#1112732).\n- ext4: check to make sure the rename(2)'s destination is not freed (bsc#1112734).\n- ext4: do not mark mmp buffer head dirty (bsc#1112743).\n- ext4: fix online resize's handling of a too-small final block group (bsc#1112739).\n- ext4: fix online resizing for bigalloc file systems with a 1k block size (bsc#1112740).\n- ext4: fix spectre gadget in ext4_mb_regular_allocator() (bsc#1112733).\n- ext4: recalucate superblock checksum after updating free blocks/inodes (bsc#1112738).\n- ext4: reset error code in ext4_find_entry in fallback (bsc#1112731).\n- ext4: show test_dummy_encryption mount option in /proc/mounts (bsc#1112741).\n- fbdev/omapfb: fix omapfb_memory_read infoleak (bsc#1051510).\n- firmware: raspberrypi: Register hwmon driver (bsc#1108468).\n- floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl (bsc#1051510).\n- fs: dcache: Avoid livelock between d_alloc_parallel and __d_add (git-fixes).\n- fs/dcache.c: fix kmemcheck splat at take_dentry_name_snapshot() (git-fixes).\n- fs: dcache: Use READ_ONCE when accessing i_dir_seq (git-fixes).\n- fs/quota: Fix spectre gadget in do_quotactl (bsc#1112745).\n- getname_kernel() needs to make sure that ->name != ->iname in long case (git-fixes).\n- gpio: adp5588: Fix sleep-in-atomic-context bug (bsc#1051510).\n- gpio: Fix crash due to registration race (bsc#1051510).\n- gpiolib-acpi: Register GpioInt ACPI event handlers from a late_initcall (bsc#1051510).\n- gpio: mb86s70: Revert 'Return error if requesting an already assigned gpio' (bsc#1051510).\n- hfsplus: do not return 0 when fill_super() failed (bsc#1051510).\n- hfsplus: stop workqueue when fill_super() failed (bsc#1051510).\n- hfs: prevent crash on exit from failed search (bsc#1051510).\n- hid: add support for Apple Magic Keyboards (bsc#1051510).\n- hid: hid-saitek: Add device ID for RAT 7 Contagion (bsc#1051510).\n- hid: hid-sensor-hub: Force logical minimum to 1 for power and report state (bsc#1051510).\n- hid: quirks: fix support for Apple Magic Keyboards (bsc#1051510).\n- hid: sensor-hub: Restore fixup for Lenovo ThinkPad Helix 2 sensor hub report (bsc#1051510).\n- hv: avoid crash in vmbus sysfs files (bnc#1108377).\n- hv_netvsc: Fix a deadlock by getting rtnl lock earlier in netvsc_probe() (bsc#1109772).\n- hv_netvsc: fix schedule in RCU context ().\n- hwmon: Add support for RPi voltage sensor (bsc#1108468).\n- hwmon: (adt7475) Make adt7475_read_word() return errors (bsc#1051510).\n- hwmon: (ina2xx) fix sysfs shunt resistor read access (bsc#1051510).\n- hwmon: rpi: add module alias to raspberrypi-hwmon (bsc#1108468).\n- hwrng: core - document the quality field (bsc#1051510).\n- hypfs_kill_super(): deal with failed allocations (bsc#1051510).\n- i2c: i2c-scmi: fix for i2c_smbus_write_block_data (bsc#1051510).\n- i2c: rcar: cleanup DMA for all kinds of failure (bsc#1051510).\n- iio: adc: at91: fix acking DRDY irq on simple conversions (bsc#1051510).\n- iio: adc: at91: fix wrong channel number in triggered buffer mode (bsc#1051510).\n- iio: adc: imx25-gcq: Fix leak of device_node in mx25_gcq_setup_cfgs() (bsc#1051510).\n- Input: atakbd - fix Atari CapsLock behaviour (bsc#1051510).\n- Input: atakbd - fix Atari keymap (bsc#1051510).\n- intel_th: pci: Add Ice Lake PCH support (bsc#1051510).\n- iommu/arm-smmu: Error out only if not enough context interrupts (bsc#1106237).\n- iommu/vt-d: Add definitions for PFSID (bsc#1106237).\n- iommu/vt-d: Fix dev iotlb pfsid use (bsc#1106237).\n- iommu/vt-d: Fix scatterlist offset handling (bsc#1106237).\n- ipc/shm.c add ->pagesize function to shm_vm_ops (bsc#1111811).\n- iwlwifi: dbg: do not crash if the firmware crashes in the middle of a debug dump (bsc#1051510).\n- iwlwifi: mvm: Allow TKIP for AP mode (bsc#1051510).\n- iwlwifi: mvm: check for n_profiles validity in EWRD ACPI (bsc#1051510).\n- iwlwifi: mvm: clear HW_RESTART_REQUESTED when stopping the interface (bsc#1051510).\n- iwlwifi: mvm: open BA session only when sta is authorized (bsc#1051510).\n- iwlwifi: mvm: send BCAST management frames to the right station (bsc#1051510).\n- iwlwifi: pcie: gen2: build A-MSDU only for GSO (bsc#1051510).\n- iwlwifi: pcie gen2: check iwl_pcie_gen2_set_tb() return value (bsc#1051510).\n- jbd2: fix use after free in jbd2_log_do_checkpoint() (bsc#1113257).\n- kABI: Hide get_msr_feature() in kvm_x86_ops (bsc#1106240).\n- KABI: hide new member in struct iommu_table from genksyms (bsc#1061840).\n- KABI: powerpc: export __find_linux_pte as __find_linux_pte_or_hugepte (bsc#1061840).\n- kabi/severities: correct nvdimm kabi exclusion\n- kabi/severities: ignore ppc64 realmode helpers. KVM fixes remove exports of realmode_pfn_to_page iommu_tce_xchg_rm mm_iommu_lookup_rm mm_iommu_ua_to_hpa_rm. Some are no longer used and others are no longer exported because the code was consolideted in one place. These helpers are to be called in realmode and linking to them from non-KVM modules is a bug. Hence removing them does not break KABI.\n- kabi/severities: ignore __xive_vm_h_* KVM internal symbols.\n- Kbuild: fix # escaping in .cmd files for future Make (git-fixes).\n- kernfs: update comment about kernfs_path() return value (bsc#1051510).\n- kprobes/x86: Fix %p uses in error messages (bsc#1110006).\n- ksm: fix unlocked iteration over vmas in cmp_and_merge_page() (VM Functionality bsc#1111806).\n- kvm: Make VM ioctl do valloc for some archs (bsc#1111506).\n- KVM: PPC: Add pt_regs into kvm_vcpu_arch and move vcpu->arch.gpr[] into it (bsc#1061840).\n- KVM: PPC: Avoid marking DMA-mapped pages dirty in real mode (bsc#1061840).\n- KVM: PPC: Book3S: Add MMIO emulation for VMX instructions (bsc#1061840).\n- KVM: PPC: Book3S: Allow backing bigger guest IOMMU pages with smaller physical pages (bsc#1061840).\n- KVM: PPC: Book3S: Check KVM_CREATE_SPAPR_TCE_64 parameters (bsc#1061840).\n- KVM: PPC: Book3S: Eliminate some unnecessary checks (bsc#1061840).\n- KVM: PPC: Book3S: Fix compile error that occurs with some gcc versions (bsc#1061840).\n- KVM: PPC: Book3S: Fix matching of hardware and emulated TCE tables (bsc#1061840).\n- KVM: PPC: Book3S HV: Add of_node_put() in success path (bsc#1061840).\n- KVM: PPC: Book3S HV: Add 'online' register to ONE_REG interface (bsc#1061840).\n- KVM: PPC: Book3S HV: Allow creating max number of VCPUs on POWER9 (bsc#1061840).\n- KVM: PPC: Book3S HV: Allow HPT and radix on the same core for POWER9 v2.2 (bsc#1061840).\n- KVM: PPC: Book3S HV: Avoid crash from THP collapse during radix page fault (bsc#1061840).\n- KVM: PPC: Book3S HV: Avoid shifts by negative amounts (bsc#1061840).\n- KVM: PPC: Book3S HV: Check DR not IR to chose real vs virt mode MMIOs (bsc#1061840).\n- KVM: PPC: Book3S HV: Do not truncate HPTE index in xlate function (bsc#1061840).\n- KVM: PPC: Book3S HV: Do not use compound_order to determine host mapping size (bsc#1061840).\n- KVM: PPC: Book3S HV: Do not use existing 'prodded' flag for XIVE escalations (bsc#1061840).\n- KVM: PPC: Book 3S HV: Do ptesync in radix guest exit path (bsc#1061840).\n- KVM: PPC: Book3S HV: Do SLB load/unload with guest LPCR value loaded (bsc#1061840).\n- KVM: PPC: Book3S HV: Enable migration of decrementer register (bsc#1061840).\n- KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix conditions for starting vcpu (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix constant size warning (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix duplication of host SLB entries (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix guest r11 corruption with POWER9 TM workarounds (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix handling of large pages in radix page fault handler (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix handling of secondary HPTEG in HPT resizing code (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix inaccurate comment (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix kvmppc_bad_host_intr for real mode interrupts (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix trap number return from __kvmppc_vcore_entry (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix typo in kvmppc_hv_get_dirty_log_radix() (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix VRMA initialization with 2MB or 1GB memory backing (bsc#1061840).\n- KVM: PPC: Book3S HV: Handle 1GB pages in radix page fault handler (bsc#1061840).\n- KVM: PPC: Book3S HV: Improve handling of debug-trigger HMIs on POWER9 (bsc#1061840).\n- KVM: PPC: Book3S HV: Keep XIVE escalation interrupt masked unless ceded (bsc#1061840).\n- KVM: PPC: Book3S HV: Lockless tlbie for HPT hcalls (bsc#1061840).\n- KVM: PPC: Book3S HV: Make HPT resizing work on POWER9 (bsc#1061840).\n- KVM: PPC: Book3S HV: Make radix clear pte when unmapping (bsc#1061840).\n- KVM: PPC: Book3S HV: Make radix use correct tlbie sequence in kvmppc_radix_tlbie_page (bsc#1061840).\n- KVM: PPC: Book3S HV: Make xive_pushed a byte, not a word (bsc#1061840).\n- KVM: PPC: Book3S HV: Pack VCORE IDs to access full VCPU ID space (bsc#1061840).\n- KVM: PPC: Book3S HV: radix: Do not clear partition PTE when RC or write bits do not match (bsc#1061840).\n- KVM: PPC: Book3S HV: Radix page fault handler optimizations (bsc#1061840).\n- KVM: PPC: Book3S HV: radix: Refine IO region partition scope attributes (bsc#1061840).\n- KVM: PPC: Book3S HV: Read kvm->arch.emul_smt_mode under kvm->lock (bsc#1061840).\n- KVM: PPC: Book3S HV: Recursively unmap all page table entries when unmapping (bsc#1061840).\n- KVM: PPC: Book3S HV: Remove useless statement (bsc#1061840).\n- KVM: PPC: Book3S HV: Remove vcpu->arch.dec usage (bsc#1061840).\n- KVM: PPC: Book3S HV: Send kvmppc_bad_interrupt NMIs to Linux handlers (bsc#1061840).\n- KVM: PPC: Book3S HV: Set RWMR on POWER8 so PURR/SPURR count correctly (bsc#1061840).\n- KVM: PPC: Book3S HV: Snapshot timebase offset on guest entry (bsc#1061840).\n- KVM: PPC: Book3S HV: Streamline setting of reference and change bits (bsc#1061840).\n- KVM: PPC: Book3S HV: Use a helper to unmap ptes in the radix fault path (bsc#1061840).\n- KVM: PPC: Book3S HV: Use __gfn_to_pfn_memslot() in page fault handler (bsc#1061840).\n- KVM: PPC: Book3S HV: XIVE: Resend re-routed interrupts on CPU priority change (bsc#1061840).\n- KVM: PPC: Book3S PR: Add guest MSR parameter for kvmppc_save_tm()/kvmppc_restore_tm() (bsc#1061840).\n- KVM: PPC: Book3S PR: Move kvmppc_save_tm/kvmppc_restore_tm to separate file (bsc#1061840).\n- KVM: PPC: Book3S: Use correct page shift in H_STUFF_TCE (bsc#1061840).\n- KVM: PPC: Fix a mmio_host_swabbed uninitialized usage issue (bsc#1061840).\n- KVM: PPC: Make iommu_table::it_userspace big endian (bsc#1061840).\n- KVM: PPC: Move nip/ctr/lr/xer registers to pt_regs in kvm_vcpu_arch (bsc#1061840).\n- KVM: PPC: Use seq_puts() in kvmppc_exit_timing_show() (bsc#1061840).\n- KVM: SVM: Add MSR-based feature support for serializing LFENCE (bsc#1106240).\n- KVM: VMX: support MSR_IA32_ARCH_CAPABILITIES as a feature MSR (bsc#1106240).\n- KVM: VMX: Tell the nested hypervisor to skip L1D flush on vmentry (bsc#1106240).\n- KVM: x86: Add a framework for supporting MSR-based features (bsc#1106240).\n- KVM: x86: define SVM/VMX specific kvm_arch_[alloc|free]_vm (bsc#1111506).\n- KVM: X86: Introduce kvm_get_msr_feature() (bsc#1106240).\n- kvm/x86: kABI fix for vm_alloc/vm_free changes (bsc#1111506).\n- kvm: x86: Set highest physical address bits in non-present/reserved SPTEs (bsc#1106240).\n- libertas: call into generic suspend code before turning off power (bsc#1051510).\n- libnvdimm, badrange: remove a WARN for list_empty (bsc#112128).\n- libnvdimm, dimm: Maximize label transfer size (bsc#1111921, bsc#1113408).\n- libnvdimm, dimm: Maximize label transfer size (bsc#1111921, bsc#1113408, bsc#1113972).\n- libnvdimm: Introduce locked DIMM capacity support (bsc#112128).\n- libnvdimm, label: change nvdimm_num_label_slots per UEFI 2.7 (bsc#1111921, bsc#1113408).\n- libnvdimm, label: change nvdimm_num_label_slots per UEFI 2.7 (bsc#1111921, bsc#1113408, bsc#1113972).\n- libnvdimm, label: Fix sparse warning (bsc#1111921, bsc#1113408, ).\n- libnvdimm, label: Fix sparse warning (bsc#1111921, bsc#1113408, bsc#1113972).\n- libnvdimm: move poison list functions to a new 'badrange' file (bsc#112128).\n- libnvdimm/nfit_test: add firmware download emulation (bsc#112128).\n- libnvdimm/nfit_test: adding support for unit testing enable LSS status (bsc#112128).\n- libnvdimm, testing: Add emulation for smart injection commands (bsc#112128).\n- libnvdimm, testing: update the default smart ctrl_temperature (bsc#112128).\n- lib/ubsan: add type mismatch handler for new GCC/Clang (bsc#1051510).\n- lib/ubsan.c: s/missaligned/misaligned/ (bsc#1051510).\n- livepatch: create and include UAPI headers ().\n- lockd: fix 'list_add double add' caused by legacy signal interface (git-fixes).\n- loop: add recursion validation to LOOP_CHANGE_FD (bsc#1112711).\n- loop: do not call into filesystem while holding lo_ctl_mutex (bsc#1112710).\n- loop: fix LOOP_GET_STATUS lock imbalance (bsc#1113284).\n- mac80211: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bsc#1051510).\n- mac80211: do not convert to A-MSDU if frag/subframe limited (bsc#1051510).\n- mac80211: do not Tx a deauth frame if the AP forbade Tx (bsc#1051510).\n- mac80211: fix a race between restart and CSA flows (bsc#1051510).\n- mac80211: Fix station bandwidth setting after channel switch (bsc#1051510).\n- mac80211_hwsim: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bsc#1051510).\n- mac80211_hwsim: require at least one channel (bsc#1051510).\n- mac80211: mesh: fix HWMP sequence numbering to follow standard (bsc#1051510).\n- mac80211: minstrel: fix using short preamble CCK rates on HT clients (bsc#1051510).\n- mac80211: Run TXQ teardown code before de-registering interfaces (bsc#1051510).\n- mac80211: shorten the IBSS debug messages (bsc#1051510).\n- mach64: detect the dot clock divider correctly on sparc (bsc#1051510).\n- make sure that __dentry_kill() always invalidates d_seq, unhashed or not (git-fixes).\n- md: fix NULL dereference of mddev->pers in remove_and_add_spares() (git-fixes).\n- md/raid10: fix that replacement cannot complete recovery after reassemble (git-fixes).\n- md/raid1: add error handling of read error from FailFast device (git-fixes).\n- md/raid5-cache: disable reshape completely (git-fixes).\n- md/raid5: fix data corruption of replacements after originals dropped (git-fixes).\n- media: af9035: prevent buffer overflow on write (bsc#1051510).\n- media: cx231xx: fix potential sign-extension overflow on large shift (bsc#1051510).\n- media: dvb: fix compat ioctl translation (bsc#1051510).\n- media: em28xx: fix input name for Terratec AV 350 (bsc#1051510).\n- media: em28xx: use a default format if TRY_FMT fails (bsc#1051510).\n- media: pci: cx23885: handle adding to list failure (bsc#1051510).\n- media: tvp5150: avoid going past array on v4l2_querymenu() (bsc#1051510).\n- media: tvp5150: fix switch exit in set control handler (bsc#1051510).\n- media: tvp5150: fix width alignment during set_selection() (bsc#1051510).\n- media: uvcvideo: Fix uvc_alloc_entity() allocation alignment (bsc#1051510).\n- media: v4l2-tpg: fix kernel oops when enabling HFLIP and OSD (bsc#1051510).\n- media: videobuf-dma-sg: Fix dma_{sync,unmap}_sg() calls (bsc#1051510).\n- media: vsp1: Fix YCbCr planar formats pitch calculation (bsc#1051510).\n- mfd: arizona: Correct calling of runtime_put_sync (bsc#1051510).\n- mmc: block: avoid multiblock reads for the last sector in SPI mode (bsc#1051510).\n- mm: fix BUG_ON() in vmf_insert_pfn_pud() from VM_MIXEDMAP removal (bsc#1111841).\n- mm/migrate: Use spin_trylock() while resetting rate limit ().\n- mm: /proc/pid/pagemap: hide swap entries from unprivileged users (Git-fixes bsc#1109907).\n- modpost: ignore livepatch unresolved relocations ().\n- move changes without Git-commit out of sorted section\n- mwifiex: handle race during mwifiex_usb_disconnect (bsc#1051510).\n- net/smc: retain old name for diag_mode field (bsc#1106287, LTC#170892).\n- net/smc: use __aligned_u64 for 64-bit smc_diag fields (bsc#1101138, LTC#164002).\n- NFC: nfcmrvl_uart: fix OF child-node lookup (bsc#1051510).\n- nfit_test: add error injection DSMs (bsc#112128).\n- nfit_test: fix buffer overrun, add sanity check (bsc#112128).\n- nfit_test: improve structure offset handling (bsc#112128).\n- nfit_test: prevent parsing error of nfit_test.0 (bsc#112128).\n- nfit_test: when clearing poison, also remove badrange entries (bsc#112128).\n- NFS: Avoid quadratic search when freeing delegations (bsc#1084760).\n- nvdimm: Clarify comment in sizeof_namespace_index (bsc#1111921, bsc#1113408).\n- nvdimm: Clarify comment in sizeof_namespace_index (bsc#1111921, bsc#1113408, bsc#1113972).\n- nvdimm: Remove empty if statement (bsc#1111921, bsc#1113408, ).\n- nvdimm: Remove empty if statement (bsc#1111921, bsc#1113408, bsc#1113972).\n- nvdimm: Sanity check labeloff (bsc#1111921, bsc#1113408, ).\n- nvdimm: Sanity check labeloff (bsc#1111921, bsc#1113408, bsc#1113972).\n- nvdimm: Split label init out from the logic for getting config data (bsc#1111921, bsc#1113408).\n- nvdimm: Split label init out from the logic for getting config data (bsc#1111921, bsc#1113408, bsc#1113972).\n- nvdimm: Use namespace index data to reduce number of label reads needed (bsc#1111921, bsc#1113408).\n- nvdimm: Use namespace index data to reduce number of label reads needed (bsc#1111921, bsc#1113408, bsc#1113972).\n- of: add helper to lookup compatible child node (bsc#1106110)\n- orangefs: fix deadlock; do not write i_size in read_iter (bsc#1051510).\n- orangefs: initialize op on loop restart in orangefs_devreq_read (bsc#1051510).\n- orangefs_kill_sb(): deal with allocation failures (bsc#1051510).\n- orangefs: use list_for_each_entry_safe in purge_waiting_ops (bsc#1051510).\n- ovl: fix format of setxattr debug (git-fixes).\n- ovl: Sync upper dirty data when syncing overlayfs (git-fixes).\n- PCI/ASPM: Fix link_state teardown on device removal (bsc#1051510).\n- PCI: hv: Do not wait forever on a device that has disappeared (bsc#1109806).\n- PCI: hv: Use effective affinity mask (bsc#1109772).\n- PCI: Reprogram bridge prefetch registers on resume (bsc#1051510).\n- pipe: match pipe_max_size data type with procfs (git-fixes).\n- PM / Domains: Fix genpd to deal with drivers returning 1 from ->prepare() (bsc#1051510).\n- powerpc/kvm/booke: Fix altivec related build break (bsc#1061840).\n- powerpc/kvm: Switch kvm pmd allocator to custom allocator (bsc#1061840).\n- powerpc/mm/hugetlb: initialize the pagetable cache correctly for hugetlb (bsc#1091800).\n- powerpc/mm: Rename find_linux_pte_or_hugepte() (bsc#1061840).\n- powerpc/numa: Skip onlining a offline node in kdump path (bsc#1109784).\n- powerpc/powernv: Add indirect levels to it_userspace (bsc#1061840).\n- powerpc/powernv/ioda2: Reduce upper limit for DMA window size (bsc#1055120).\n- powerpc/powernv/ioda: Allocate indirect TCE levels on demand (bsc#1061840).\n- powerpc/powernv/ioda: Finish removing explicit max window size check (bsc#1061840).\n- powerpc/powernv/ioda: Remove explicit max window size check (bsc#1061840).\n- powerpc/powernv: Move TCE manupulation code to its own file (bsc#1061840).\n- powerpc/powernv: Rework TCE level allocation (bsc#1061840).\n- powerpc/pseries: Fix build break for SPLPAR=n and CPU hotplug (bsc#1079524, git-fixes).\n- powerpc/pseries: Fix CONFIG_NUMA=n build (bsc#1067906, git-fixes).\n- powerpc/pseries: Fix 'OF: ERROR: Bad of_node_put() on /cpus' during DLPAR (bsc#1113295).\n- powerpc: pseries: remove dlpar_attach_node dependency on full path (bsc#1113295).\n- powerpc/rtas: Fix a potential race between CPU-Offline & Migration (bsc#1111870).\n- powerpc/xive: Move definition of ESB bits (bsc#1061840).\n- powerpc/xmon: Add ISA v3.0 SPRs to SPR dump (bsc#1061840).\n- printk: drop in_nmi check from printk_safe_flush_on_panic() (bsc#1112170).\n- printk/tracing: Do not trace printk_nmi_enter() (bsc#1112208).\n- proc: restrict kernel stack dumps to root (git-fixes). blacklist.conf:\n- qmi_wwan: Added support for Gemalto's Cinterion ALASxx WWAN interface (bsc#1051510).\n- qrtr: add MODULE_ALIAS macro to smd (bsc#1051510).\n- r8169: Clear RTL_FLAG_TASK_*_PENDING when clearing RTL_FLAG_TASK_ENABLED (bsc#1051510).\n- race of lockd inetaddr notifiers vs nlmsvc_rqst change (git-fixes).\n- RAID10 BUG_ON in raise_barrier when force is true and conf->barrier is 0 (git-fixes).\n- random: rate limit unseeded randomness warnings (git-fixes).\n- rculist: add list_for_each_entry_from_rcu() (bsc#1084760).\n- rculist: Improve documentation for list_for_each_entry_from_rcu() (bsc#1084760).\n- reiserfs: add check to detect corrupted directory entry (bsc#1109818).\n- reiserfs: do not panic on bad directory entries (bsc#1109818).\n- rename a hv patch to reduce conflicts in -AZURE\n- reorder a qedi patch to allow further work in this branch\n- resource: Include resource end in walk_*() interfaces (bsc#1114279).\n- Revert 'drm/amdgpu: Add an ATPX quirk for hybrid laptop' (bsc#1051510).\n- Revert 'drm/i915/gvt: set max priority for gvt context' (bsc#1051510).\n- Revert 'gpio: set up initial state from .get_direction()' (bsc#1051510).\n- Revert 'iommu/io-pgtable: Avoid redundant TLB syncs' (bsc#1106237).\n- Revert 'mwifiex: fix incorrect ht capability problem' (bsc#1051510).\n- Revert 'mwifiex: handle race during mwifiex_usb_disconnect' (bsc#1051510).\n- Revert 'pinctrl: sunxi: Do not enforce bias disable (for now)' (bsc#1051510).\n- rpc_pipefs: fix double-dput() (bsc#1051510).\n- rpmsg: Correct support for MODULE_DEVICE_TABLE() (git-fixes).\n- sched/numa: Limit the conditions where scan period is reset ().\n- scripts/series2git:\n- scripts/series2git: Revert the change mistakenly taken A 'fix' for series2git went in mistakenly among other patches. Revert it here. It'll be picked up from a proper branch if need.\n- scsi: core: Allow state transitions from OFFLINE to BLOCKED (bsc#1112246).\n- scsi: core: Allow state transitions from OFFLINE to BLOCKED (bsc#1112246).\n- scsi: ipr: Eliminate duplicate barriers ().\n- scsi: ipr: fix incorrect indentation of assignment statement ().\n- scsi: ipr: Use dma_pool_zalloc() ().\n- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1104731).\n- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1104731).\n- scsi: libfc: retry PRLI if we cannot analyse the payload (bsc#1104731).\n- scsi: libfc: retry PRLI if we cannot analyse the payload (bsc#1104731).\n- scsi: qla2xxx: do not allow negative thresholds (bsc#1108870).\n- scsi: qla2xxx: Fix driver hang when FC-NVMe LUNs are configured (bsc#1108870).\n- scsi: qla2xxx: Fix duplicate switch database entries (bsc#1108870).\n- scsi: qla2xxx: Fix for double free of SRB structure (bsc#1108870).\n- scsi: qla2xxx: Fix memory leak for allocating abort IOCB (bsc#1111830).\n- scsi: qla2xxx: Fix NVMe session hang on unload (bsc#1108870).\n- scsi: qla2xxx: Fix NVMe Target discovery (bsc#1108870).\n- scsi: qla2xxx: Fix recursive mailbox timeout (bsc#1108870).\n- scsi: qla2xxx: Fix re-using LoopID when handle is in use (bsc#1108870).\n- scsi: qla2xxx: Move log messages before issuing command to firmware (bsc#1108870).\n- scsi: qla2xxx: Return switch command on a timeout (bsc#1108870).\n- scsi: target: prefer dbroot of /etc/target over /var/target (bsc#1111928).\n- serial: 8250: Fix clearing FIFOs in RS485 mode again (bsc#1051510).\n- signal: Properly deliver SIGSEGV from x86 uprobes (bsc#1110006).\n- smb2: fix missing files in root share directory listing (bsc#1112907).\n- smb2: fix missing files in root share directory listing (bsc#1112907).\n- smb3: fill in statfs fsid and correct namelen (bsc#1112905).\n- smb3: fill in statfs fsid and correct namelen (bsc#1112905).\n- smb3: fix reset of bytes read and written stats (bsc#1112906).\n- smb3: fix reset of bytes read and written stats (bsc#1112906).\n- smb3: on reconnect set PreviousSessionId field (bsc#1112899).\n- smb3: on reconnect set PreviousSessionId field (bsc#1112899).\n- sock_diag: fix use-after-free read in __sk_free (bsc#1051510).\n- soc/tegra: pmc: Fix child-node lookup (bsc#1051510).\n- soreuseport: initialise timewait reuseport field (bsc#1051510).\n- sound: do not call skl_init_chip() to reset intel skl soc (bsc#1051510).\n- sound: enable interrupt after dma buffer initialization (bsc#1051510).\n- spi/bcm63xx-hsspi: keep pll clk enabled (bsc#1051510).\n- spi: bcm-qspi: switch back to reading flash using smaller chunks (bsc#1051510).\n- spi: sh-msiof: fix deferred probing (bsc#1051510).\n- squashfs: be more careful about metadata corruption (bsc#1051510).\n- Squashfs: Compute expected length from inode size rather than block length (bsc#1051510).\n- squashfs metadata 2: electric boogaloo (bsc#1051510).\n- squashfs: more metadata hardening (bsc#1051510).\n- squashfs: more metadata hardening (bsc#1051510).\n- staging: comedi: ni_mio_common: protect register write overflow (bsc#1051510).\n- stm: Potential read overflow in stm_char_policy_set_ioctl() (bsc#1051510).\n- supported.conf: mark raspberrypi-hwmon as supported\n- switchtec: Fix Spectre v1 vulnerability (bsc#1051510).\n- sysfs: Do not return POSIX ACL xattrs via listxattr (git-fixes).\n- target: log Data-Out timeouts as errors (bsc#1095805).\n- target: log NOP ping timeouts as errors (bsc#1095805).\n- target: split out helper for cxn timeout error stashing (bsc#1095805).\n- target: stash sess_err_stats on Data-Out timeout (bsc#1095805).\n- target: use ISCSI_IQN_LEN in iscsi_target_stat (bsc#1095805).\n- team: Forbid enslaving team device to itself (bsc#1051510).\n- tools build: fix # escaping in .cmd files for future Make (git-fixes).\n- tools/testing/nvdimm: advertise a write cache for nfit_test (bsc#112128).\n- tools/testing/nvdimm: allow custom error code injection (bsc#112128).\n- tools/testing/nvdimm: disable labels for nfit_test.1 (bsc#112128).\n- tools/testing/nvdimm: enable labels for nfit_test.1 dimms (bsc#112128).\n- tools/testing/nvdimm: fix missing newline in nfit_test_dimm 'handle' attribute (bsc#112128).\n- tools/testing/nvdimm: Fix support for emulating controller temperature (bsc#112128).\n- tools/testing/nvdimm: force nfit_test to depend on instrumented modules (bsc#112128).\n- tools/testing/nvdimm: improve emulation of smart injection (bsc#112128).\n- tools/testing/nvdimm: kaddr and pfn can be NULL to ->direct_access() (bsc#112128).\n- tools/testing/nvdimm: Make DSM failure code injection an override (bsc#112128).\n- tools/testing/nvdimm: smart alarm/threshold control (bsc#112128).\n- tools/testing/nvdimm: stricter bounds checking for error injection commands (bsc#112128).\n- tools/testing/nvdimm: support nfit_test_dimm attributes under nfit_test.1 (bsc#112128).\n- tools/testing/nvdimm: unit test clear-error commands (bsc#112128).\n- tools/vm/page-types.c: fix 'defined but not used' warning (bsc#1051510).\n- tools/vm/slabinfo.c: fix sign-compare warning (bsc#1051510).\n- tracing: Add barrier to trace_printk() buffer nesting modification (bsc#1112219).\n- tty: Do not block on IO when ldisc change is pending (bnc#1105428).\n- tty: fix data race between tty_init_dev and flush of buf (bnc#1105428).\n- tty: Hold tty_ldisc_lock() during tty_reopen() (bnc#1105428).\n- tty/ldsem: Add lockdep asserts for ldisc_sem (bnc#1105428).\n- tty/ldsem: Convert to regular lockdep annotations (bnc#1105428).\n- tty/ldsem: Decrement wait_readers on timeouted down_read() (bnc#1105428).\n- tty/ldsem: Wake up readers after timed out down_write() (bnc#1105428).\n- tty: Simplify tty->count math in tty_reopen() (bnc#1105428).\n- Update patches.arch/KVM-PPC-Book3S-HV-Snapshot-timebase-offset-on-guest-.patch (bsc#1061840, bsc#1086196).\n- Update patches.arch/powerpc-powernv-ioda2-Reduce-upper-limit-for-DMA-win.patch (bsc#1061840, bsc#1055120).\n- Update patches.fixes/0002-nfs41-do-not-return-ENOMEM-on-LAYOUTUNAVAILABLE.patch (git-fixes, bsc#1103925).\n- Update patches.fixes/libnvdimm-dimm-maximize-label-transfer-size.patch (bsc#1111921, bsc#1113408, bsc#1113972).\n- Update patches.fixes/libnvdimm-label-change-nvdimm_num_label_slots-per-uefi-2-7.patch (bsc#1111921, bsc#1113408, bsc#1113972).\n- Update patches.fixes/libnvdimm-label-fix-sparse-warning.patch (bsc#1111921, bsc#1113408, bsc#1113972).\n- Update patches.fixes/nvdimm-clarify-comment-in-sizeof_namespace_index.patch (bsc#1111921, bsc#1113408, bsc#1113972).\n- Update patches.fixes/nvdimm-remove-empty-if-statement.patch (bsc#1111921, bsc#1113408, bsc#1113972).\n- Update patches.fixes/nvdimm-sanity-check-labeloff.patch (bsc#1111921, bsc#1113408, bsc#1113972).\n- Update patches.fixes/nvdimm-split-label-init-out-from-the-logic-for-getting-config-data.patch (bsc#1111921, bsc#1113408, bsc#1113972).\n- Update patches.fixes/nvdimm-use-namespace-index-data-to-reduce-number-of-label-reads-needed.patch (bsc#1111921, bsc#1113408, bsc#1113972).\n- usb: chipidea: Prevent unbalanced IRQ disable (bsc#1051510).\n- usb: gadget: fotg210-udc: Fix memory leak of fotg210->ep[i] (bsc#1051510).\n- usb: gadget: fsl_udc_core: check allocation return value and cleanup on failure (bsc#1051510).\n- usb: gadget: fsl_udc_core: fixup struct_udc_setup documentation (bsc#1051510).\n- usbip: tools: fix atoi() on non-null terminated string (bsc#1051510).\n- USB: remove LPM management from usb_driver_claim_interface() (bsc#1051510).\n- USB: serial: cypress_m8: fix interrupt-out transfer length (bsc#1051510).\n- USB: serial: simple: add Motorola Tetra MTP6550 id (bsc#1051510).\n- usb: xhci-mtk: resume USB3 roothub first (bsc#1051510).\n- USB: yurex: Check for truncation in yurex_read() (bsc#1051510).\n- userfaultfd: hugetlbfs: fix userfaultfd_huge_must_wait() pte access (bsc#1109739).\n- use the new async probing feature for the hyperv drivers (bsc#1109772).\n- Use upstream version of pci-hyperv patch (35a88a1)\n- VFS: close race between getcwd() and d_move() (git-fixes).\n- vfs: fix freeze protection in mnt_want_write_file() for overlayfs (git-fixes).\n- vmbus: do not return values for uninitalized channels (bsc#1051510).\n- vti4: Do not count header length twice on tunnel setup (bsc#1051510).\n- vti6: fix PMTU caching and reporting on xmit (bsc#1051510).\n- vti6: remove !skb->ignore_df check from vti6_xmit() (bsc#1051510).\n- Workaround for mysterious NVMe breakage with i915 CFL (bsc#1111040).\n- x86/acpi: Prevent X2APIC id 0xffffffff from being accounted (bsc#1110006).\n- x86/boot/KASLR: Work around firmware bugs by excluding EFI_BOOT_SERVICES_* and EFI_LOADER_* from KASLR's choice (bnc#1112878).\n- x86/boot: Move EISA setup to a separate file (bsc#1110006).\n- x86/cpufeature: Add User-Mode Instruction Prevention definitions (bsc#1110006).\n- x86/cpufeatures: Add Intel Total Memory Encryption cpufeature (bsc#1110006).\n- x86/eisa: Add missing include (bsc#1110006).\n- x86/EISA: Do not probe EISA bus for Xen PV guests (bsc#1110006).\n- x86/fpu: Remove second definition of fpu in __fpu__restore_sig() (bsc#1110006).\n- x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772).\n- x86/kasan: Panic if there is not enough memory to boot (bsc#1110006).\n- x86/kexec: Correct KEXEC_BACKUP_SRC_END off-by-one error (bsc#1114279).\n- x86/MCE: Fix stack out-of-bounds write in mce-inject.c: Flags_read() (bsc#1110006).\n- x86, nfit_test: Add unit test for memcpy_mcsafe() (bsc#112128).\n- x86/paravirt: Fix some warning messages (bnc#1065600).\n- x86/percpu: Fix this_cpu_read() (bsc#1110006).\n- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bsc#1105536).\n- x86/time: Correct the attribute on jiffies' definition (bsc#1110006).\n- xen/gntdev: avoid out of bounds access in case of partial gntdev_mmap() (bnc#1065600).\n- xen: Remove unnecessary BUG_ON from __unbind_from_irq() (bnc#1065600).\n- xen-swiotlb: fix the check condition for xen_swiotlb_free_coherent (bnc#1065600).\n- xfrm: use complete IPv6 addresses for hash (bsc#1109330).\n- xfs: do not fail when converting shortform attr to long form during ATTR_REPLACE (bsc#1105025).\n- xfs: do not fail when converting shortform attr to long form during ATTR_REPLACE (bsc#1105025).\n- xhci: Add missing CAS workaround for Intel Sunrise Point xHCI (bsc#1051510).\n- xhci: Do not print a warning when setting link state for disabled ports (bsc#1051510).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-SERVER-12-SP4-2018-2803", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3934-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:3934-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183934-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:3934-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-November/004903.html", }, { category: "self", summary: "SUSE Bug 1051510", url: "https://bugzilla.suse.com/1051510", }, { category: "self", summary: "SUSE Bug 1055120", url: "https://bugzilla.suse.com/1055120", }, { category: "self", summary: "SUSE Bug 1061840", url: "https://bugzilla.suse.com/1061840", }, { category: "self", summary: "SUSE Bug 1065600", url: "https://bugzilla.suse.com/1065600", }, { category: "self", summary: "SUSE Bug 1066674", url: "https://bugzilla.suse.com/1066674", }, { category: "self", summary: "SUSE Bug 1067906", url: "https://bugzilla.suse.com/1067906", }, { category: "self", summary: "SUSE Bug 1076830", url: "https://bugzilla.suse.com/1076830", }, { category: "self", summary: "SUSE Bug 1079524", url: "https://bugzilla.suse.com/1079524", }, { category: "self", summary: "SUSE Bug 1083647", url: "https://bugzilla.suse.com/1083647", }, { category: "self", summary: "SUSE Bug 1084760", url: "https://bugzilla.suse.com/1084760", }, { category: "self", summary: "SUSE Bug 1084831", url: "https://bugzilla.suse.com/1084831", }, { category: "self", summary: "SUSE Bug 1086196", url: "https://bugzilla.suse.com/1086196", }, { category: "self", summary: "SUSE Bug 1091800", url: "https://bugzilla.suse.com/1091800", }, { category: "self", summary: "SUSE Bug 1094825", url: "https://bugzilla.suse.com/1094825", }, { category: "self", summary: "SUSE Bug 1095805", url: "https://bugzilla.suse.com/1095805", }, { category: "self", summary: "SUSE Bug 1100132", url: "https://bugzilla.suse.com/1100132", }, { category: "self", summary: "SUSE Bug 1101138", url: "https://bugzilla.suse.com/1101138", }, { category: "self", summary: "SUSE Bug 1103356", url: "https://bugzilla.suse.com/1103356", }, { category: "self", summary: "SUSE Bug 1103543", url: "https://bugzilla.suse.com/1103543", }, { category: "self", summary: "SUSE Bug 1103925", url: "https://bugzilla.suse.com/1103925", }, { category: "self", summary: "SUSE Bug 1104124", url: "https://bugzilla.suse.com/1104124", }, { category: "self", summary: "SUSE Bug 1104731", url: "https://bugzilla.suse.com/1104731", }, { category: "self", summary: "SUSE Bug 1105025", url: "https://bugzilla.suse.com/1105025", }, { category: "self", summary: "SUSE Bug 1105428", url: "https://bugzilla.suse.com/1105428", }, { category: "self", summary: "SUSE Bug 1105536", url: "https://bugzilla.suse.com/1105536", }, { category: "self", summary: "SUSE Bug 1106110", url: "https://bugzilla.suse.com/1106110", }, { category: "self", summary: "SUSE Bug 1106237", url: "https://bugzilla.suse.com/1106237", }, { category: "self", summary: "SUSE Bug 1106240", url: "https://bugzilla.suse.com/1106240", }, { category: "self", summary: "SUSE Bug 1106287", url: "https://bugzilla.suse.com/1106287", }, { category: "self", summary: "SUSE Bug 1106359", url: "https://bugzilla.suse.com/1106359", }, { category: "self", summary: "SUSE Bug 1106838", url: "https://bugzilla.suse.com/1106838", }, { category: "self", summary: "SUSE Bug 1108377", url: "https://bugzilla.suse.com/1108377", }, { category: "self", summary: "SUSE Bug 1108468", url: "https://bugzilla.suse.com/1108468", }, { category: "self", summary: "SUSE Bug 1108870", url: "https://bugzilla.suse.com/1108870", }, { category: "self", summary: "SUSE Bug 1109330", url: "https://bugzilla.suse.com/1109330", }, { category: "self", summary: "SUSE Bug 1109739", url: "https://bugzilla.suse.com/1109739", }, { category: "self", summary: "SUSE Bug 1109772", url: "https://bugzilla.suse.com/1109772", }, { category: "self", summary: "SUSE Bug 1109784", url: "https://bugzilla.suse.com/1109784", }, { category: "self", summary: "SUSE Bug 1109806", url: "https://bugzilla.suse.com/1109806", }, { category: "self", summary: "SUSE Bug 1109818", url: "https://bugzilla.suse.com/1109818", }, { category: "self", summary: "SUSE Bug 1109907", url: "https://bugzilla.suse.com/1109907", }, { category: "self", summary: "SUSE Bug 1109911", url: "https://bugzilla.suse.com/1109911", }, { category: "self", summary: "SUSE Bug 1109915", url: "https://bugzilla.suse.com/1109915", }, { category: "self", summary: "SUSE Bug 1109919", url: "https://bugzilla.suse.com/1109919", }, { category: "self", summary: "SUSE Bug 1109951", url: "https://bugzilla.suse.com/1109951", }, { category: "self", summary: "SUSE Bug 1110006", url: "https://bugzilla.suse.com/1110006", }, { category: "self", summary: "SUSE Bug 1111040", url: "https://bugzilla.suse.com/1111040", }, { category: "self", summary: "SUSE Bug 1111076", url: "https://bugzilla.suse.com/1111076", }, { category: "self", summary: "SUSE Bug 1111506", url: "https://bugzilla.suse.com/1111506", }, { category: "self", summary: "SUSE Bug 1111806", url: "https://bugzilla.suse.com/1111806", }, { category: "self", summary: "SUSE Bug 1111811", url: "https://bugzilla.suse.com/1111811", }, { category: "self", summary: "SUSE Bug 1111819", url: "https://bugzilla.suse.com/1111819", }, { category: "self", summary: "SUSE Bug 1111830", url: "https://bugzilla.suse.com/1111830", }, { category: "self", summary: "SUSE Bug 1111834", url: "https://bugzilla.suse.com/1111834", }, { category: "self", summary: "SUSE Bug 1111841", url: "https://bugzilla.suse.com/1111841", }, { category: "self", summary: "SUSE Bug 1111870", url: "https://bugzilla.suse.com/1111870", }, { category: "self", summary: "SUSE Bug 1111901", url: "https://bugzilla.suse.com/1111901", }, { category: "self", summary: "SUSE Bug 1111904", url: "https://bugzilla.suse.com/1111904", }, { category: "self", summary: "SUSE Bug 1111921", url: "https://bugzilla.suse.com/1111921", }, { category: "self", summary: "SUSE Bug 1111928", url: "https://bugzilla.suse.com/1111928", }, { category: "self", summary: "SUSE Bug 1111983", url: "https://bugzilla.suse.com/1111983", }, { category: "self", summary: "SUSE Bug 1112170", url: "https://bugzilla.suse.com/1112170", }, { category: "self", summary: "SUSE Bug 1112173", url: "https://bugzilla.suse.com/1112173", }, { category: "self", summary: "SUSE Bug 1112208", url: "https://bugzilla.suse.com/1112208", }, { category: "self", summary: "SUSE Bug 1112219", url: "https://bugzilla.suse.com/1112219", }, { category: "self", summary: "SUSE Bug 1112221", url: "https://bugzilla.suse.com/1112221", }, { category: "self", summary: "SUSE Bug 1112246", url: "https://bugzilla.suse.com/1112246", }, { category: "self", summary: "SUSE Bug 1112372", url: "https://bugzilla.suse.com/1112372", }, { category: "self", summary: "SUSE Bug 1112514", url: "https://bugzilla.suse.com/1112514", }, { category: "self", summary: "SUSE Bug 1112554", url: "https://bugzilla.suse.com/1112554", }, { category: "self", summary: "SUSE Bug 1112708", url: "https://bugzilla.suse.com/1112708", }, { category: "self", summary: "SUSE Bug 1112710", url: "https://bugzilla.suse.com/1112710", }, { category: "self", summary: "SUSE Bug 1112711", url: "https://bugzilla.suse.com/1112711", }, { category: "self", summary: "SUSE Bug 1112712", url: "https://bugzilla.suse.com/1112712", }, { category: "self", summary: "SUSE Bug 1112713", url: "https://bugzilla.suse.com/1112713", }, { category: "self", summary: "SUSE Bug 1112731", url: "https://bugzilla.suse.com/1112731", }, { category: "self", summary: "SUSE Bug 1112732", url: "https://bugzilla.suse.com/1112732", }, { category: "self", summary: "SUSE Bug 1112733", url: "https://bugzilla.suse.com/1112733", }, { category: "self", summary: "SUSE Bug 1112734", url: "https://bugzilla.suse.com/1112734", }, { category: "self", summary: "SUSE Bug 1112735", url: "https://bugzilla.suse.com/1112735", }, { category: "self", summary: "SUSE Bug 1112736", url: "https://bugzilla.suse.com/1112736", }, { category: "self", summary: "SUSE Bug 1112738", url: "https://bugzilla.suse.com/1112738", }, { category: "self", summary: "SUSE Bug 1112739", url: "https://bugzilla.suse.com/1112739", }, { category: "self", summary: "SUSE Bug 1112740", url: "https://bugzilla.suse.com/1112740", }, { category: "self", summary: "SUSE Bug 1112741", url: "https://bugzilla.suse.com/1112741", }, { category: "self", summary: "SUSE Bug 1112743", url: "https://bugzilla.suse.com/1112743", }, { category: "self", summary: "SUSE Bug 1112745", url: "https://bugzilla.suse.com/1112745", }, { category: "self", summary: "SUSE Bug 1112746", url: "https://bugzilla.suse.com/1112746", }, { category: "self", summary: "SUSE Bug 1112878", url: "https://bugzilla.suse.com/1112878", }, { category: "self", summary: "SUSE Bug 1112894", url: "https://bugzilla.suse.com/1112894", }, { category: "self", summary: "SUSE Bug 1112899", url: "https://bugzilla.suse.com/1112899", }, { category: "self", summary: "SUSE Bug 1112902", url: "https://bugzilla.suse.com/1112902", }, { category: "self", summary: "SUSE Bug 1112903", url: "https://bugzilla.suse.com/1112903", }, { category: "self", summary: "SUSE Bug 1112905", url: "https://bugzilla.suse.com/1112905", }, { category: "self", summary: "SUSE Bug 1112906", url: "https://bugzilla.suse.com/1112906", }, { category: "self", summary: "SUSE Bug 1112907", url: "https://bugzilla.suse.com/1112907", }, { category: "self", summary: "SUSE Bug 1113257", url: "https://bugzilla.suse.com/1113257", }, { category: "self", summary: "SUSE Bug 1113284", url: "https://bugzilla.suse.com/1113284", }, { category: "self", summary: "SUSE Bug 1113295", url: "https://bugzilla.suse.com/1113295", }, { category: "self", summary: "SUSE Bug 1113408", url: "https://bugzilla.suse.com/1113408", }, { category: "self", summary: "SUSE Bug 1113667", url: "https://bugzilla.suse.com/1113667", }, { category: "self", summary: "SUSE Bug 1113722", url: "https://bugzilla.suse.com/1113722", }, { category: "self", summary: "SUSE Bug 1113751", url: "https://bugzilla.suse.com/1113751", }, { category: "self", summary: "SUSE Bug 1113780", url: "https://bugzilla.suse.com/1113780", }, { category: "self", summary: "SUSE Bug 1113972", url: "https://bugzilla.suse.com/1113972", }, { category: "self", summary: "SUSE Bug 1114279", url: "https://bugzilla.suse.com/1114279", }, { category: "self", summary: "SUSE CVE CVE-2017-16533 page", url: "https://www.suse.com/security/cve/CVE-2017-16533/", }, { category: "self", summary: "SUSE CVE CVE-2017-18224 page", url: "https://www.suse.com/security/cve/CVE-2017-18224/", }, { category: "self", summary: "SUSE CVE CVE-2018-18386 page", url: "https://www.suse.com/security/cve/CVE-2018-18386/", }, { category: "self", summary: "SUSE CVE CVE-2018-18445 page", url: "https://www.suse.com/security/cve/CVE-2018-18445/", }, { category: "self", summary: "SUSE CVE CVE-2018-18710 page", url: "https://www.suse.com/security/cve/CVE-2018-18710/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2018-11-28T10:13:03Z", generator: { date: "2018-11-28T10:13:03Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:3934-1", initial_release_date: "2018-11-28T10:13:03Z", revision_history: [ { date: "2018-11-28T10:13:03Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-azure-4.12.14-6.3.1.noarch", product: { name: "kernel-devel-azure-4.12.14-6.3.1.noarch", product_id: "kernel-devel-azure-4.12.14-6.3.1.noarch", }, }, { category: "product_version", name: "kernel-source-azure-4.12.14-6.3.1.noarch", product: { name: "kernel-source-azure-4.12.14-6.3.1.noarch", product_id: "kernel-source-azure-4.12.14-6.3.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-azure-4.12.14-6.3.1.x86_64", product: { name: "kernel-azure-4.12.14-6.3.1.x86_64", product_id: "kernel-azure-4.12.14-6.3.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-base-4.12.14-6.3.1.x86_64", product: { name: "kernel-azure-base-4.12.14-6.3.1.x86_64", product_id: "kernel-azure-base-4.12.14-6.3.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-devel-4.12.14-6.3.1.x86_64", product: { name: "kernel-azure-devel-4.12.14-6.3.1.x86_64", product_id: "kernel-azure-devel-4.12.14-6.3.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-azure-4.12.14-6.3.1.x86_64", product: { name: "kernel-syms-azure-4.12.14-6.3.1.x86_64", product_id: "kernel-syms-azure-4.12.14-6.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP4", product: { name: "SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-azure-4.12.14-6.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", }, product_reference: "kernel-azure-4.12.14-6.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-base-4.12.14-6.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", }, product_reference: "kernel-azure-base-4.12.14-6.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-4.12.14-6.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", }, product_reference: "kernel-azure-devel-4.12.14-6.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-4.12.14-6.3.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", }, product_reference: "kernel-devel-azure-4.12.14-6.3.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-4.12.14-6.3.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", }, product_reference: "kernel-source-azure-4.12.14-6.3.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-4.12.14-6.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", }, product_reference: "kernel-syms-azure-4.12.14-6.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-4.12.14-6.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", }, product_reference: "kernel-azure-4.12.14-6.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-base-4.12.14-6.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", }, product_reference: "kernel-azure-base-4.12.14-6.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-4.12.14-6.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", }, product_reference: "kernel-azure-devel-4.12.14-6.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-4.12.14-6.3.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", }, product_reference: "kernel-devel-azure-4.12.14-6.3.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-4.12.14-6.3.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", }, product_reference: "kernel-source-azure-4.12.14-6.3.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-4.12.14-6.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", }, product_reference: "kernel-syms-azure-4.12.14-6.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, ], }, vulnerabilities: [ { cve: "CVE-2017-16533", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16533", }, ], notes: [ { category: "general", text: "The usbhid_parse function in drivers/hid/usbhid/hid-core.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16533", url: "https://www.suse.com/security/cve/CVE-2017-16533", }, { category: "external", summary: "SUSE Bug 1066674 for CVE-2017-16533", url: "https://bugzilla.suse.com/1066674", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2017-16533", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2017-16533", url: "https://bugzilla.suse.com/1146519", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-28T10:13:03Z", details: "moderate", }, ], title: "CVE-2017-16533", }, { cve: "CVE-2017-18224", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-18224", }, ], notes: [ { category: "general", text: "In the Linux kernel before 4.15, fs/ocfs2/aops.c omits use of a semaphore and consequently has a race condition for access to the extent tree during read operations in DIRECT mode, which allows local users to cause a denial of service (BUG) by modifying a certain e_cpos field.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-18224", url: "https://www.suse.com/security/cve/CVE-2017-18224", }, { category: "external", summary: "SUSE Bug 1084831 for CVE-2017-18224", url: "https://bugzilla.suse.com/1084831", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-28T10:13:03Z", details: "moderate", }, ], title: "CVE-2017-18224", }, { cve: "CVE-2018-18386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18386", }, ], notes: [ { category: "general", text: "drivers/tty/n_tty.c in the Linux kernel before 4.14.11 allows local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18386", url: "https://www.suse.com/security/cve/CVE-2018-18386", }, { category: "external", summary: "SUSE Bug 1094825 for CVE-2018-18386", url: "https://bugzilla.suse.com/1094825", }, { category: "external", summary: "SUSE Bug 1112039 for CVE-2018-18386", url: "https://bugzilla.suse.com/1112039", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-28T10:13:03Z", details: "moderate", }, ], title: "CVE-2018-18386", }, { cve: "CVE-2018-18445", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18445", }, ], notes: [ { category: "general", text: "In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18445", url: "https://www.suse.com/security/cve/CVE-2018-18445", }, { category: "external", summary: "SUSE Bug 1112372 for CVE-2018-18445", url: "https://bugzilla.suse.com/1112372", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-28T10:13:03Z", details: "low", }, ], title: "CVE-2018-18445", }, { cve: "CVE-2018-18710", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18710", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18710", url: "https://www.suse.com/security/cve/CVE-2018-18710", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-18710", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-28T10:13:03Z", details: "moderate", }, ], title: "CVE-2018-18710", }, ], }
suse-su-2018:4069-1
Vulnerability from csaf_suse
Published
2018-12-11 08:24
Modified
2018-12-11 08:24
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).
- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removed entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry could remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).
- CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).
- CVE-2018-18445: Faulty computation of numeric bounds in the BPF verifier permitted out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandled 32-bit right shifts (bnc#1112372).
- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).
- CVE-2017-18224: fs/ocfs2/aops.c omitted use of a semaphore and consequently had a race condition for access to the extent tree during read operations in DIRECT mode, which allowed local users to cause a denial of service (BUG) by modifying a certain e_cpos field (bnc#1084831).
- CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674).
The following non-security bugs were fixed:
- ACPI/APEI: Handle GSIV and GPIO notification types (bsc#1115567).
- ACPICA: Tables: Add WSMT support (bsc#1089350).
- ACPI/IORT: Fix iort_get_platform_device_domain() uninitialized pointer value (bsc#1051510).
- ACPI / LPSS: Add alternative ACPI HIDs for Cherry Trail DMA controllers (bsc#1051510).
- ACPI, nfit: Fix ARS overflow continuation (bsc#1116895).
- ACPI, nfit: Prefer _DSM over _LSR for namespace label reads (bsc#1112128).
- ACPI/nfit, x86/mce: Handle only uncorrectable machine checks (bsc#1114279).
- ACPI/nfit, x86/mce: Validate a MCE's address before using it (bsc#1114279).
- ACPI / platform: Add SMB0001 HID to forbidden_id_list (bsc#1051510).
- ACPI / processor: Fix the return value of acpi_processor_ids_walk() (bsc#1051510).
- ACPI / watchdog: Prefer iTCO_wdt always when WDAT table uses RTC SRAM (bsc#1051510).
- act_ife: fix a potential use-after-free (networking-stable-18_09_11).
- Add the cherry-picked dup id for PCI dwc fix
- Add version information to KLP_SYMBOLS file
- ALSA: ac97: Fix incorrect bit shift at AC97-SPSA control write (bsc#1051510).
- ALSA: ca0106: Disable IZD on SB0570 DAC to fix audio pops (bsc#1051510).
- ALSA: control: Fix race between adding and removing a user element (bsc#1051510).
- ALSA: hda: Add 2 more models to the power_save blacklist (bsc#1051510).
- ALSA: hda: Add ASRock N68C-S UCC the power_save blacklist (bsc#1051510).
- ALSA: hda - Add mic quirk for the Lenovo G50-30 (17aa:3905) (bsc#1051510).
- ALSA: hda - Add quirk for ASUS G751 laptop (bsc#1051510).
- ALSA: hda/ca0132 - Call pci_iounmap() instead of iounmap() (bsc#1051510).
- ALSA: hda - Fix headphone pin config for ASUS G751 (bsc#1051510).
- ALSA: hda: fix unused variable warning (bsc#1051510).
- ALSA: hda/realtek - Add auto-mute quirk for HP Spectre x360 laptop (bsc#1051510).
- ALSA: hda/realtek - Add GPIO data update helper (bsc#1051510).
- ALSA: hda/realtek - Allow skipping spec->init_amp detection (bsc#1051510).
- ALSA: hda/realtek - fix headset mic detection for MSI MS-B171 (bsc#1051510).
- ALSA: hda/realtek - Fix HP Headset Mic can't record (bsc#1051510).
- ALSA: hda/realtek - fix the pop noise on headphone for lenovo laptops (bsc#1051510).
- ALSA: hda/realtek - Fix the problem of the front MIC on the Lenovo M715 (bsc#1051510).
- ALSA: hda/realtek - Manage GPIO bits commonly (bsc#1051510).
- ALSA: hda/realtek - Simplify Dell XPS13 GPIO handling (bsc#1051510).
- ALSA: hda/realtek - Support ALC300 (bsc#1051510).
- ALSA: oss: Use kvzalloc() for local buffer allocations (bsc#1051510).
- ALSA: sparc: Fix invalid snd_free_pages() at error path (bsc#1051510).
- ALSA: usb-audio: Add vendor and product name for Dell WD19 Dock (bsc#1051510).
- ALSA: usb-audio: update quirk for B&W PX to remove microphone (bsc#1051510).
- ALSA: wss: Fix invalid snd_free_pages() at error path (bsc#1051510).
- amd/iommu: Fix Guest Virtual APIC Log Tail Address Register (bsc#1106105).
- arm64: KVM: Move CPU ID reg trap setup off the world switch path (bsc#1110998).
- arm64: KVM: Sanitize PSTATE.M when being set from userspace (bsc#1110998).
- arm64: KVM: Tighten guest core register access from userspace (bsc#1110998).
- ARM: dts: at91: add new compatibility string for macb on sama5d3 (bsc#1051510).
- ASoC: dwc: Added a quirk DW_I2S_QUIRK_16BIT_IDX_OVERRIDE to dwc (bsc#1085535)
- ASoC: Intel: cht_bsw_max98090: add support for Baytrail (bsc#1051510).
- ASoC: intel: cht_bsw_max98090_ti: Add quirk for boards using pmc_plt_clk_0 (bsc#1051510).
- ASoC: intel: skylake: Add missing break in skl_tplg_get_token() (bsc#1051510).
- ASoC: Intel: Skylake: Reset the controller in probe (bsc#1051510).
- ASoC: rsnd: adg: care clock-frequency size (bsc#1051510).
- ASoC: rsnd: do not fallback to PIO mode when -EPROBE_DEFER (bsc#1051510).
- ASoC: rt5514: Fix the issue of the delay volume applied again (bsc#1051510).
- ASoC: sigmadsp: safeload should not have lower byte limit (bsc#1051510).
- ASoC: sun8i-codec: fix crash on module removal (bsc#1051510).
- ASoC: wm8804: Add ACPI support (bsc#1051510).
- ata: Fix racy link clearance (bsc#1107866).
- ataflop: fix error handling during setup (bsc#1051510).
- ath10k: fix kernel panic issue during pci probe (bsc#1051510).
- ath10k: fix scan crash due to incorrect length calculation (bsc#1051510).
- ath10k: fix use-after-free in ath10k_wmi_cmd_send_nowait (bsc#1051510).
- ath10k: schedule hardware restart if WMI command times out (bsc#1051510).
- autofs: fix autofs_sbi() does not check super block type (git-fixes).
- autofs: fix slab out of bounds read in getname_kernel() (git-fixes).
- autofs: mount point create should honour passed in mode (git-fixes).
- badblocks: fix wrong return value in badblocks_set if badblocks are disabled (git-fixes).
- batman-adv: Avoid probe ELP information leak (bsc#1051510).
- batman-adv: Expand merged fragment buffer for full packet (bsc#1051510).
- batman-adv: fix backbone_gw refcount on queue_work() failure (bsc#1051510).
- batman-adv: fix hardif_neigh refcount on queue_work() failure (bsc#1051510).
- batman-adv: Use explicit tvlv padding for ELP packets (bsc#1051510).
- bdi: Fix another oops in wb_workfn() (bsc#1112746).
- bdi: Preserve kabi when adding cgwb_release_mutex (bsc#1112746).
- bitops: protect variables in bit_clear_unless() macro (bsc#1051510).
- bitops: protect variables in set_mask_bits() macro (bsc#1051510).
- Blacklist commit that modifies Scsi_Host/kabi (bsc#1114579)
- Blacklist sd_zbc patch that is too invasive (bsc#1114583)
- Blacklist virtio patch that uses bio_integrity_bytes() (bsc#1114585)
- blk-mq: I/O and timer unplugs are inverted in blktrace (bsc#1112713).
- block, bfq: fix wrong init of saved start time for weight raising (bsc#1112708).
- block: bfq: swap puts in bfqg_and_blkg_put (bsc#1112712).
- block: copy ioprio in __bio_clone_fast() (bsc#1082653).
- block: respect virtual boundary mask in bvecs (bsc#1113412).
- Bluetooth: btbcm: Add entry for BCM4335C0 UART bluetooth (bsc#1051510).
- Bluetooth: SMP: fix crash in unpairing (bsc#1051510).
- bnxt_en: Fix TX timeout during netpoll (networking-stable-18_10_16).
- bnxt_en: free hwrm resources, if driver probe fails (networking-stable-18_10_16).
- bonding: avoid possible dead-lock (networking-stable-18_10_16).
- bonding: fix length of actor system (networking-stable-18_11_02).
- bonding: fix warning message (networking-stable-18_10_16).
- bonding: pass link-local packets to bonding master also (networking-stable-18_10_16).
- bpf: fix partial copy of map_ptr when dst is scalar (bsc#1083647).
- bpf, net: add skb_mac_header_len helper (networking-stable-18_09_24).
- bpf/verifier: disallow pointer subtraction (bsc#1083647).
- bpf: wait for running BPF programs when updating map-in-map (bsc#1083647).
- brcmfmac: fix for proper support of 160MHz bandwidth (bsc#1051510).
- brcmfmac: fix reporting support for 160 MHz channels (bsc#1051510).
- brcmutil: really fix decoding channel info for 160 MHz bandwidth (bsc#1051510).
- bridge: do not add port to router list when receives query with source 0.0.0.0 (networking-stable-18_11_02).
- Btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667).
- Btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).
- Btrfs: fix assertion failure during fsync in no-holes mode (bsc#1118136).
- Btrfs: fix assertion on fsync of regular file when using no-holes feature (bsc#1118137).
- Btrfs: fix cur_offset in the error case for nocow (bsc#1118140).
- Btrfs: fix data corruption due to cloning of eof block (bsc#1116878).
- Btrfs: fix deadlock on tree root leaf when finding free extent (bsc#1116876).
- Btrfs: fix deadlock when writing out free space caches (bsc#1116700).
- Btrfs: fix infinite loop on inode eviction after deduplication of eof block (bsc#1116877).
- Btrfs: fix missing error return in btrfs_drop_snapshot (Git-fixes bsc#1109919).
- Btrfs: fix null pointer dereference on compressed write path error (bsc#1116698).
- Btrfs: fix use-after-free during inode eviction (bsc#1116701).
- Btrfs: fix use-after-free when dumping free space (bsc#1116862).
- Btrfs: fix warning when replaying log after fsync of a tmpfile (bsc#1116692).
- Btrfs: fix wrong dentries after fsync of file that got its parent replaced (bsc#1116693).
- Btrfs: handle errors while updating refcounts in update_ref_for_cow (Git-fixes bsc#1109915).
- Btrfs: make sure we create all new block groups (bsc#1116699).
- Btrfs: protect space cache inode alloc with GFP_NOFS (bsc#1116863).
- Btrfs: send, fix infinite loop due to directory rename dependencies (bsc#1118138).
- cachefiles: fix the race between cachefiles_bury_object() and rmdir(2) (bsc#1051510).
- can: dev: __can_get_echo_skb(): Do not crash the kernel if can_priv::echo_skb is accessed out of bounds (bsc#1051510).
- can: dev: can_get_echo_skb(): factor out non sending code to __can_get_echo_skb() (bsc#1051510).
- can: dev: __can_get_echo_skb(): print error message, if trying to echo non existing skb (bsc#1051510).
- can: dev: __can_get_echo_skb(): replace struct can_frame by canfd_frame to access frame length (bsc#1051510).
- can: hi311x: Use level-triggered interrupt (bsc#1051510).
- can: raw: check for CAN FD capable netdev in raw_sendmsg() (bsc#1051510).
- can: rcar_can: Fix erroneous registration (bsc#1051510).
- can: rx-offload: introduce can_rx_offload_get_echo_skb() and can_rx_offload_queue_sorted() functions (bsc#1051510).
- cdc-acm: correct counting of UART states in serial state notification (bsc#1051510).
- cdc-acm: do not reset notification buffer index upon urb unlinking (bsc#1051510).
- cdc-acm: fix race between reset and control messaging (bsc#1051510).
- ceph: avoid a use-after-free in ceph_destroy_options() (bsc#1111983).
- ceph: fix dentry leak in ceph_readdir_prepopulate (bsc#1114839).
- ceph: quota: fix null pointer dereference in quota check (bsc#1114839).
- cfg80211: Address some corner cases in scan result channel updating (bsc#1051510).
- cfg80211: fix use-after-free in reg_process_hint() (bsc#1051510).
- cifs: check for STATUS_USER_SESSION_DELETED (bsc#1112902).
- cifs: fix memory leak in SMB2_open() (bsc#1112894).
- cifs: Fix use after free of a mid_q_entry (bsc#1112903).
- clk: at91: Fix division by zero in PLL recalc_rate() (bsc#1051510).
- clk: fixed-factor: fix of_node_get-put imbalance (bsc#1051510).
- clk: fixed-rate: fix of_node_get-put imbalance (bsc#1051510).
- clk: mmp2: fix the clock id for sdh2_clk and sdh3_clk (bsc#1051510).
- clk: rockchip: Fix static checker warning in rockchip_ddrclk_get_parent call (bsc#1051510).
- clk: s2mps11: Add used attribute to s2mps11_dt_match (bsc#1051510).
- clk: s2mps11: Fix matching when built as module and DT node contains compatible (bsc#1051510).
- clk: samsung: exynos5420: Enable PERIS clocks for suspend (bsc#1051510).
- clk: x86: add 'ether_clk' alias for Bay Trail / Cherry Trail (bsc#1051510).
- clk: x86: Stop marking clocks as CLK_IS_CRITICAL (bsc#1051510).
- clockevents/drivers/i8253: Add support for PIT shutdown quirk (bsc#1051510).
- clocksource/drivers/ti-32k: Add CLOCK_SOURCE_SUSPEND_NONSTOP flag for non-am43 SoCs (bsc#1051510).
- clocksource/drivers/timer-atmel-pit: Properly handle error cases (bsc#1051510).
- coda: fix 'kernel memory exposure attempt' in fsync (bsc#1051510).
- configfs: replace strncpy with memcpy (bsc#1051510).
- crypto: caam - fix implicit casts in endianness helpers (bsc#1051510).
- crypto: chelsio - Fix memory corruption in DMA Mapped buffers (bsc#1051510).
- crypto: lrw - Fix out-of bounds access on counter overflow (bsc#1051510).
- crypto: simd - correctly take reqsize of wrapped skcipher into account (bsc#1051510).
- crypto: tcrypt - fix ghash-generic speed test (bsc#1051510).
- dax: Fix deadlock in dax_lock_mapping_entry() (bsc#1109951).
- debugobjects: Make stack check warning more informative (bsc#1051510).
- Documentation/l1tf: Fix small spelling typo (bsc#1051510).
- Documentation/l1tf: Fix typos (bsc#1051510).
- Documentation/l1tf: Remove Yonah processors from not vulnerable list (bsc#1051510).
- do d_instantiate/unlock_new_inode combinations safely (git-fixes).
- Do not leak MNT_INTERNAL away from internal mounts (git-fixes).
- driver/dma/ioat: Call del_timer_sync() without holding prep_lock (bsc#1051510).
- drm/amdgpu: add missing CHIP_HAINAN in amdgpu_ucode_get_load_type (bsc#1051510).
- drm/amdgpu: Fix SDMA HQD destroy error on gfx_v7 (bsc#1051510).
- drm/amdgpu: Fix vce work queue was not cancelled when suspend (bsc#1106110)
- drm/amdgpu/powerplay: fix missing break in switch statements (bsc#1113722)
- drm/ast: change resolution may cause screen blurred (boo#1112963).
- drm/ast: fixed cursor may disappear sometimes (bsc#1051510).
- drm/ast: Fix incorrect free on ioregs (bsc#1051510).
- drm/ast: Remove existing framebuffers before loading driver (boo#1112963)
- drm/dp_mst: Check if primary mstb is null (bsc#1051510).
- drm/dp_mst: Skip validating ports during destruction, just ref (bsc#1051510).
- drm/edid: Add 6 bpc quirk for BOE panel (bsc#1051510).
- drm/edid: Add 6 bpc quirk for BOE panel in HP Pavilion 15-n233sl (bsc#1113722)
- drm/edid: VSDB yCBCr420 Deep Color mode bit definitions (bsc#1051510).
- drm: fb-helper: Reject all pixel format changing requests (bsc#1113722)
- drm/hisilicon: hibmc: Do not carry error code in HiBMC framebuffer (bsc#1113722)
- drm/hisilicon: hibmc: Do not overwrite fb helper surface depth (bsc#1113722)
- drm/i915/audio: Hook up component bindings even if displays are (bsc#1113722)
- drm/i915: Do not oops during modeset shutdown after lpe audio deinit (bsc#1051510).
- drm/i915: Do not unset intel_connector->mst_port (bsc#1051510).
- drm/i915/dp: Link train Fallback on eDP only if fallback link BW can fit panel's native mode (bsc#1051510).
- drm/i915/execlists: Force write serialisation into context image vs execution (bsc#1051510).
- drm/i915: Fix ilk+ watermarks when disabling pipes (bsc#1051510).
- drm/i915/gen9+: Fix initial readout for Y tiled framebuffers (bsc#1113722)
- drm/i915/glk: Add Quirk for GLK NUC HDMI port issues (bsc#1051510).
- drm/i915/glk: Remove 99% limitation (bsc#1051510).
- drm/i915/hdmi: Add HDMI 2.0 audio clock recovery N values (bsc#1051510).
- drm/i915: Large page offsets for pread/pwrite (bsc#1051510).
- drm/i915: Mark pin flags as u64 (bsc#1051510).
- drm/i915: Restore vblank interrupts earlier (bsc#1051510).
- drm/i915: Skip vcpi allocation for MSTB ports that are gone (bsc#1051510).
- drm/i915: Write GPU relocs harder with gen3 (bsc#1051510).
- drm: mali-dp: Call drm_crtc_vblank_reset on device init (bsc#1051510).
- drm/mediatek: fix OF sibling-node lookup (bsc#1106110)
- drm/meson: add support for 1080p25 mode (bsc#1051510).
- drm/meson: Enable fast_io in meson_dw_hdmi_regmap_config (bsc#1051510).
- drm/meson: Fix OOB memory accesses in meson_viu_set_osd_lut() (bsc#1051510).
- drm/msm: fix OF child-node lookup (bsc#1106110)
- drm/nouveau: Check backlight IDs are >= 0, not > 0 (bsc#1051510).
- drm/nouveau: Do not disable polling in fallback mode (bsc#1103356).
- drm/omap: fix memory barrier bug in DMM driver (bsc#1051510).
- drm/rockchip: Allow driver to be shutdown on reboot/kexec (bsc#1051510).
- drm/sti: do not remove the drm_bridge that was never added (bsc#1100132)
- drm/sun4i: Fix an ulong overflow in the dotclock driver (bsc#1106110)
- drm/virtio: fix bounds check in virtio_gpu_cmd_get_capset() (bsc#1113722)
- e1000: check on netif_running() before calling e1000_up() (bsc#1051510).
- e1000: ensure to free old tx/rx rings in set_ringparam() (bsc#1051510).
- EDAC, {i7core,sb,skx}_edac: Fix uncorrected error counting (bsc#1114279).
- EDAC: Raise the maximum number of memory controllers (bsc#1113780).
- EDAC, skx_edac: Fix logical channel intermediate decoding (bsc#1114279).
- EDAC, thunderx: Fix memory leak in thunderx_l2c_threaded_isr() (bsc#1114279).
- eeprom: at24: change nvmem stride to 1 (bsc#1051510).
- eeprom: at24: check at24_read/write arguments (bsc#1051510).
- eeprom: at24: correctly set the size for at24mac402 (bsc#1051510).
- Enable LSPCON instead of blindly disabling HDMI
- enic: do not call enic_change_mtu in enic_probe (bsc#1051510).
- enic: handle mtu change for vf properly (bsc#1051510).
- enic: initialize enic->rfs_h.lock in enic_probe (bsc#1051510).
- ethtool: fix a privilege escalation bug (bsc#1076830).
- ext2, dax: set ext2_dax_aops for dax files (bsc#1112554).
- ext4: add missing brelse() add_new_gdb_meta_bg()'s error path (bsc#1117795).
- ext4: add missing brelse() in set_flexbg_block_bitmap()'s error path (bsc#1117794).
- ext4: add missing brelse() update_backups()'s error path (bsc#1117796).
- ext4: avoid arithemetic overflow that can trigger a BUG (bsc#1112736).
- ext4: avoid buffer leak in ext4_orphan_add() after prior errors (bsc#1117802).
- ext4: avoid buffer leak on shutdown in ext4_mark_iloc_dirty() (bsc#1117801).
- ext4: avoid divide by zero fault when deleting corrupted inline directories (bsc#1112735).
- ext4: avoid potential extra brelse in setup_new_flex_group_blocks() (bsc#1117792).
- ext4: check for NUL characters in extended attribute's name (bsc#1112732).
- ext4: check to make sure the rename(2)'s destination is not freed (bsc#1112734).
- ext4: do not mark mmp buffer head dirty (bsc#1112743).
- ext4: fix buffer leak in __ext4_read_dirblock() on error path (bsc#1117807).
- ext4: fix buffer leak in ext4_xattr_move_to_block() on error path (bsc#1117806).
- ext4: fix missing cleanup if ext4_alloc_flex_bg_array() fails while resizing (bsc#1117798).
- ext4: fix online resize's handling of a too-small final block group (bsc#1112739).
- ext4: fix online resizing for bigalloc file systems with a 1k block size (bsc#1112740).
- ext4: fix possible inode leak in the retry loop of ext4_resize_fs() (bsc#1117799).
- ext4: fix possible leak of sbi->s_group_desc_leak in error path (bsc#1117803).
- ext4: fix possible leak of s_journal_flag_rwsem in error path (bsc#1117804).
- ext4: fix setattr project check in fssetxattr ioctl (bsc#1117789).
- ext4: fix spectre gadget in ext4_mb_regular_allocator() (bsc#1112733).
- ext4: fix use-after-free race in ext4_remount()'s error path (bsc#1117791).
- ext4: initialize retries variable in ext4_da_write_inline_data_begin() (bsc#1117788).
- ext4: propagate error from dquot_initialize() in EXT4_IOC_FSSETXATTR (bsc#1117790).
- ext4: recalucate superblock checksum after updating free blocks/inodes (bsc#1112738).
- ext4: release bs.bh before re-using in ext4_xattr_block_find() (bsc#1117805).
- ext4: reset error code in ext4_find_entry in fallback (bsc#1112731).
- ext4: show test_dummy_encryption mount option in /proc/mounts (bsc#1112741).
- fbdev: fix broken menu dependencies (bsc#1113722)
- fbdev/omapfb: fix omapfb_memory_read infoleak (bsc#1051510).
- firmware: dcdbas: Add support for WSMT ACPI table (bsc#1089350 ).
- firmware: dcdbas: include linux/io.h (bsc#1089350).
- Fix kABI for 'Ensure we commit after writeback is complete' (bsc#1111809).
- floppy: fix race condition in __floppy_read_block_0() (bsc#1051510).
- flow_dissector: do not dissect l4 ports for fragments (networking-stable-18_11_21).
- fscache: fix race between enablement and dropping of object (bsc#1107385).
- fs: dcache: Avoid livelock between d_alloc_parallel and __d_add (git-fixes).
- fs/dcache.c: fix kmemcheck splat at take_dentry_name_snapshot() (git-fixes).
- fs: dcache: Use READ_ONCE when accessing i_dir_seq (git-fixes).
- fs: Make extension of struct super_block transparent (bsc#1117822).
- fsnotify: Fix busy inodes during unmount (bsc#1117822).
- fsnotify: fix ignore mask logic in fsnotify() (bsc#1115074).
- fs/quota: Fix spectre gadget in do_quotactl (bsc#1112745).
- ftrace: Fix debug preempt config name in stack_tracer_{en,dis}able (bsc#1117172).
- ftrace: Fix kmemleak in unregister_ftrace_graph (bsc#1117181).
- ftrace: Fix memleak when unregistering dynamic ops when tracing disabled (bsc#1117174).
- ftrace: Remove incorrect setting of glob search field (bsc#1117184).
- genirq: Fix race on spurious interrupt detection (bsc#1051510).
- getname_kernel() needs to make sure that ->name != ->iname in long case (git-fixes).
- gpio: do not free unallocated ida on gpiochip_add_data_with_key() error path (bsc#1051510).
- grace: replace BUG_ON by WARN_ONCE in exit_net hook (git-fixes).
- gso_segment: Reset skb->mac_len after modifying network header (networking-stable-18_09_24).
- hfsplus: do not return 0 when fill_super() failed (bsc#1051510).
- hfsplus: stop workqueue when fill_super() failed (bsc#1051510).
- hfs: prevent crash on exit from failed search (bsc#1051510).
- HID: hiddev: fix potential Spectre v1 (bsc#1051510).
- HID: hid-sensor-hub: Force logical minimum to 1 for power and report state (bsc#1051510).
- HID: quirks: fix support for Apple Magic Keyboards (bsc#1051510).
- HID: sensor-hub: Restore fixup for Lenovo ThinkPad Helix 2 sensor hub report (bsc#1051510).
- HID: uhid: forbid UHID_CREATE under KERNEL_DS or elevated privileges (bsc#1051510).
- hv: avoid crash in vmbus sysfs files (bnc#1108377).
- hv_netvsc: fix schedule in RCU context ().
- hv_netvsc: ignore devices that are not PCI (networking-stable-18_09_11).
- hwmon: (core) Fix double-free in __hwmon_device_register() (bsc#1051510).
- hwmon: (ibmpowernv) Remove bogus __init annotations (bsc#1051510).
- hwmon: (ina2xx) Fix current value calculation (bsc#1051510).
- hwmon (ina2xx) Fix NULL id pointer in probe() (bsc#1051510).
- hwmon: (nct6775) Fix potential Spectre v1 (bsc#1051510).
- hwmon: (pmbus) Fix page count auto-detection (bsc#1051510).
- hwmon: (pwm-fan) Set fan speed to 0 on suspend (bsc#1051510).
- hwmon: (raspberrypi) Fix initial notify (bsc#1051510).
- hwmon: (w83795) temp4_type has writable permission (bsc#1051510).
- hwrng: core - document the quality field (bsc#1051510).
- hypfs_kill_super(): deal with failed allocations (bsc#1051510).
- i2c: i2c-scmi: fix for i2c_smbus_write_block_data (bsc#1051510).
- i2c: rcar: cleanup DMA for all kinds of failure (bsc#1051510).
- ibmvnic: fix accelerated VLAN handling ().
- ibmvnic: fix index in release_rx_pools (bsc#1115440, bsc#1115433).
- ibmvnic: remove ndo_poll_controller ().
- ibmvnic: Update driver queues after change in ring size support ().
- iio: accel: adxl345: convert address field usage in iio_chan_spec (bsc#1051510).
- iio: ad5064: Fix regulator handling (bsc#1051510).
- iio: adc: at91: fix acking DRDY irq on simple conversions (bsc#1051510).
- iio: adc: at91: fix wrong channel number in triggered buffer mode (bsc#1051510).
- iio: adc: imx25-gcq: Fix leak of device_node in mx25_gcq_setup_cfgs() (bsc#1051510).
- iio:st_magn: Fix enable device after trigger (bsc#1051510).
- ima: fix showing large 'violations' or 'runtime_measurements_count' (bsc#1051510).
- include/linux/pfn_t.h: force '~' to be parsed as an unary operator (bsc#1051510).
- inet: make sure to grab rcu_read_lock before using ireq->ireq_opt (networking-stable-18_10_16).
- Input: atakbd - fix Atari CapsLock behaviour (bsc#1051510).
- Input: atakbd - fix Atari keymap (bsc#1051510).
- Input: elan_i2c - add ACPI ID for Lenovo IdeaPad 330-15IGM (bsc#1051510).
- Input: synaptics - avoid using uninitialized variable when probing (bsc#1051510).
- Input: xpad - add PDP device id 0x02a4 (bsc#1051510).
- Input: xpad - add support for Xbox1 PDP Camo series gamepad (bsc#1051510).
- Input: xpad - avoid using __set_bit() for capabilities (bsc#1051510).
- Input: xpad - fix some coding style issues (bsc#1051510).
- intel_th: pci: Add Ice Lake PCH support (bsc#1051510).
- iommu/arm-smmu: Ensure that page-table updates are visible before TLBI (bsc#1106237).
- iommu/arm-smmu: Error out only if not enough context interrupts (bsc#1106237).
- iommu/ipmmu-vmsa: Fix crash on early domain free (bsc#1106105).
- iommu/vt-d: Add definitions for PFSID (bsc#1106237).
- iommu/vt-d: Fix dev iotlb pfsid use (bsc#1106237).
- iommu/vt-d: Fix NULL pointer dereference in prq_event_thread() (bsc#1106105).
- iommu/vt-d: Fix scatterlist offset handling (bsc#1106237).
- iommu/vt-d: Use memunmap to free memremap (bsc#1106105).
- ip6_tunnel: be careful when accessing the inner header (networking-stable-18_10_16).
- ip6_tunnel: Fix encapsulation layout (networking-stable-18_11_02).
- ip6_vti: fix a null pointer deference when destroy vti6 tunnel (networking-stable-18_09_11).
- ipmi: Fix timer race with module unload (bsc#1051510).
- ip_tunnel: be careful when accessing the inner header (networking-stable-18_10_16).
- ip_tunnel: do not force DF when MTU is locked (networking-stable-18_11_21).
- ipv4: lock mtu in fnhe when received PMTU < net.ipv4.route.min_pmtu (networking-stable-18_11_21).
- ipv4: tcp: send zero IPID for RST and ACK sent in SYN-RECV and TIME-WAIT state (networking-stable-18_09_11).
- ipv6: Fix PMTU updates for UDP/raw sockets in presence of VRF (networking-stable-18_11_21).
- ipv6: fix possible use-after-free in ip6_xmit() (networking-stable-18_09_24).
- ipv6: mcast: fix a use-after-free in inet6_mc_check (networking-stable-18_11_02).
- ipv6/ndisc: Preserve IPv6 control buffer if protocol error handlers are called (networking-stable-18_11_02).
- ipv6: take rcu lock in rawv6_send_hdrinc() (networking-stable-18_10_16).
- iwlwifi: dbg: allow wrt collection before ALIVE (bsc#1051510).
- iwlwifi: dbg: do not crash if the firmware crashes in the middle of a debug dump (bsc#1051510).
- iwlwifi: do not WARN on trying to dump dead firmware (bsc#1051510).
- iwlwifi: mvm: Allow TKIP for AP mode (bsc#1051510).
- iwlwifi: mvm: check for n_profiles validity in EWRD ACPI (bsc#1051510).
- iwlwifi: mvm: check for short GI only for OFDM (bsc#1051510).
- iwlwifi: mvm: check return value of rs_rate_from_ucode_rate() (bsc#1051510).
- iwlwifi: mvm: clear HW_RESTART_REQUESTED when stopping the interface (bsc#1051510).
- iwlwifi: mvm: do not use SAR Geo if basic SAR is not used (bsc#1051510).
- iwlwifi: mvm: fix BAR seq ctrl reporting (bsc#1051510).
- iwlwifi: mvm: fix regulatory domain update when the firmware starts (bsc#1051510).
- iwlwifi: mvm: open BA session only when sta is authorized (bsc#1051510).
- iwlwifi: mvm: send BCAST management frames to the right station (bsc#1051510).
- iwlwifi: mvm: support sta_statistics() even on older firmware (bsc#1051510).
- iwlwifi: pcie: avoid empty free RB queue (bsc#1051510).
- iwlwifi: pcie: gen2: build A-MSDU only for GSO (bsc#1051510).
- iwlwifi: pcie gen2: check iwl_pcie_gen2_set_tb() return value (bsc#1051510).
- jbd2: fix use after free in jbd2_log_do_checkpoint() (bsc#1113257).
- KABI fix for 'NFSv4.1: Fix up replays of interrupted requests' (git-fixes).
- kABI: Hide get_msr_feature() in kvm_x86_ops (bsc#1106240).
- KABI: hide new member in struct iommu_table from genksyms (bsc#1061840).
- KABI: mask raw in struct bpf_reg_state (bsc#1083647).
- KABI: powerpc: export __find_linux_pte as __find_linux_pte_or_hugepte (bsc#1061840).
- KABI: powerpc: Revert npu callback signature change (bsc#1055120).
- KABI: protect struct fib_nh_exception (kabi).
- KABI: protect struct rtable (kabi).
- KABI/severities: ignore __xive_vm_h_* KVM internal symbols.
- Kbuild: fix # escaping in .cmd files for future Make (git-fixes).
- kbuild: fix kernel/bounds.c 'W=1' warning (bsc#1051510).
- kbuild: move '_all' target out of $(KBUILD_SRC) conditional (bsc#1114279).
- kernfs: update comment about kernfs_path() return value (bsc#1051510).
- kgdboc: Passing ekgdboc to command line causes panic (bsc#1051510).
- kprobes/x86: Fix %p uses in error messages (bsc#1110006).
- KVM: arm/arm64: Introduce vcpu_el1_is_32bit (bsc#1110998).
- KVM: Make VM ioctl do valloc for some archs (bsc#1111506).
- KVM: nVMX: Always reflect #NM VM-exits to L1 (bsc#1106240).
- KVM: nVMX: move check_vmentry_postreqs() call to nested_vmx_enter_non_root_mode() (bsc#1106240).
- KVM: PPC: Add pt_regs into kvm_vcpu_arch and move vcpu->arch.gpr[] into it (bsc#1061840).
- KVM: PPC: Avoid marking DMA-mapped pages dirty in real mode (bsc#1061840).
- KVM: PPC: Book3S: Add MMIO emulation for VMX instructions (bsc#1061840).
- KVM: PPC: Book3S: Allow backing bigger guest IOMMU pages with smaller physical pages (bsc#1061840).
- KVM: PPC: Book3S: Check KVM_CREATE_SPAPR_TCE_64 parameters (bsc#1061840).
- KVM: PPC: Book3S: Eliminate some unnecessary checks (bsc#1061840).
- KVM: PPC: Book3S: Fix compile error that occurs with some gcc versions (bsc#1061840).
- KVM: PPC: Book3S: Fix matching of hardware and emulated TCE tables (bsc#1061840).
- KVM: PPC: Book3S HV: Add of_node_put() in success path (bsc#1061840).
- KVM: PPC: Book3S HV: Add 'online' register to ONE_REG interface (bsc#1061840).
- KVM: PPC: Book3S HV: Allow creating max number of VCPUs on POWER9 (bsc#1061840).
- KVM: PPC: Book3S HV: Allow HPT and radix on the same core for POWER9 v2.2 (bsc#1061840).
- KVM: PPC: Book3S HV: Avoid crash from THP collapse during radix page fault (bsc#1061840).
- KVM: PPC: Book3S HV: Avoid shifts by negative amounts (bsc#1061840).
- KVM: PPC: Book3S HV: Check DR not IR to chose real vs virt mode MMIOs (bsc#1061840).
- KVM: PPC: Book3S HV: Do not truncate HPTE index in xlate function (bsc#1061840).
- KVM: PPC: Book3S HV: Do not use compound_order to determine host mapping size (bsc#1061840).
- KVM: PPC: Book3S HV: Do not use existing 'prodded' flag for XIVE escalations (bsc#1061840).
- KVM: PPC: Book 3S HV: Do ptesync in radix guest exit path (bsc#1061840).
- KVM: PPC: Book3S HV: Do SLB load/unload with guest LPCR value loaded (bsc#1061840).
- KVM: PPC: Book3S HV: Enable migration of decrementer register (bsc#1061840).
- KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm (bsc#1061840).
- KVM: PPC: Book3S HV: Fix conditions for starting vcpu (bsc#1061840).
- KVM: PPC: Book3S HV: Fix constant size warning (bsc#1061840).
- KVM: PPC: Book3S HV: Fix duplication of host SLB entries (bsc#1061840).
- KVM: PPC: Book3S HV: Fix guest r11 corruption with POWER9 TM workarounds (bsc#1061840).
- KVM: PPC: Book3S HV: Fix handling of large pages in radix page fault handler (bsc#1061840).
- KVM: PPC: Book3S HV: Fix handling of secondary HPTEG in HPT resizing code (bsc#1061840).
- KVM: PPC: Book3S HV: Fix inaccurate comment (bsc#1061840).
- KVM: PPC: Book3S HV: Fix kvmppc_bad_host_intr for real mode interrupts (bsc#1061840).
- KVM: PPC: Book3S HV: Fix trap number return from __kvmppc_vcore_entry (bsc#1061840).
- KVM: PPC: Book3S HV: Fix typo in kvmppc_hv_get_dirty_log_radix() (bsc#1061840).
- KVM: PPC: Book3S HV: Fix VRMA initialization with 2MB or 1GB memory backing (bsc#1061840).
- KVM: PPC: Book3S HV: Handle 1GB pages in radix page fault handler (bsc#1061840).
- KVM: PPC: Book3S HV: Improve handling of debug-trigger HMIs on POWER9 (bsc#1061840).
- KVM: PPC: Book3S HV: Keep XIVE escalation interrupt masked unless ceded (bsc#1061840).
- KVM: PPC: Book3S HV: Lockless tlbie for HPT hcalls (bsc#1061840).
- KVM: PPC: Book3S HV: Make HPT resizing work on POWER9 (bsc#1061840).
- KVM: PPC: Book3S HV: Make radix clear pte when unmapping (bsc#1061840).
- KVM: PPC: Book3S HV: Make radix use correct tlbie sequence in kvmppc_radix_tlbie_page (bsc#1061840).
- KVM: PPC: Book3S HV: Make xive_pushed a byte, not a word (bsc#1061840).
- KVM: PPC: Book3S HV: Pack VCORE IDs to access full VCPU ID space (bsc#1061840).
- KVM: PPC: Book3S HV: radix: Do not clear partition PTE when RC or write bits do not match (bsc#1061840).
- KVM: PPC: Book3S HV: Radix page fault handler optimizations (bsc#1061840).
- KVM: PPC: Book3S HV: radix: Refine IO region partition scope attributes (bsc#1061840).
- KVM: PPC: Book3S HV: Read kvm->arch.emul_smt_mode under kvm->lock (bsc#1061840).
- KVM: PPC: Book3S HV: Recursively unmap all page table entries when unmapping (bsc#1061840).
- KVM: PPC: Book3S HV: Remove useless statement (bsc#1061840).
- KVM: PPC: Book3S HV: Remove vcpu->arch.dec usage (bsc#1061840).
- KVM: PPC: Book3S HV: Send kvmppc_bad_interrupt NMIs to Linux handlers (bsc#1061840).
- KVM: PPC: Book3S HV: Set RWMR on POWER8 so PURR/SPURR count correctly (bsc#1061840).
- KVM: PPC: Book3S HV: Snapshot timebase offset on guest entry (bsc#1061840).
- KVM: PPC: Book3S HV: Streamline setting of reference and change bits (bsc#1061840).
- KVM: PPC: Book3S HV: Use a helper to unmap ptes in the radix fault path (bsc#1061840).
- KVM: PPC: Book3S HV: Use __gfn_to_pfn_memslot() in page fault handler (bsc#1061840).
- KVM: PPC: Book3S HV: XIVE: Resend re-routed interrupts on CPU priority change (bsc#1061840).
- KVM: PPC: Book3S PR: Add guest MSR parameter for kvmppc_save_tm()/kvmppc_restore_tm() (bsc#1061840).
- KVM: PPC: Book3S PR: Move kvmppc_save_tm/kvmppc_restore_tm to separate file (bsc#1061840).
- KVM: PPC: Book3S: Use correct page shift in H_STUFF_TCE (bsc#1061840).
- KVM: PPC: Fix a mmio_host_swabbed uninitialized usage issue (bsc#1061840).
- KVM: PPC: Make iommu_table::it_userspace big endian (bsc#1061840).
- KVM: PPC: Move nip/ctr/lr/xer registers to pt_regs in kvm_vcpu_arch (bsc#1061840).
- KVM: PPC: Use seq_puts() in kvmppc_exit_timing_show() (bsc#1061840).
- KVM: s390: vsie: copy wrapping keys to right place (git-fixes).
- KVM: SVM: Add MSR-based feature support for serializing LFENCE (bsc#1106240).
- KVM: svm: Ensure an IBPB on all affected CPUs when freeing a vmcb (bsc#1114279).
- KVM: VMX: re-add ple_gap module parameter (bsc#1106240).
- KVM: VMX: support MSR_IA32_ARCH_CAPABILITIES as a feature MSR (bsc#1106240).
- KVM: VMX: Tell the nested hypervisor to skip L1D flush on vmentry (bsc#1106240).
- KVM: x86: Add a framework for supporting MSR-based features (bsc#1106240).
- KVM: x86: define SVM/VMX specific kvm_arch_[alloc|free]_vm (bsc#1111506).
- KVM: x86: Fix kernel info-leak in KVM_HC_CLOCK_PAIRING hypercall (bsc#1106240).
- KVM: X86: Introduce kvm_get_msr_feature() (bsc#1106240).
- KVM/x86: kABI fix for vm_alloc/vm_free changes (bsc#1111506).
- KVM: x86: Set highest physical address bits in non-present/reserved SPTEs (bsc#1106240).
- libceph: bump CEPH_MSG_MAX_DATA_LEN (bsc#1114839).
- libceph: fall back to sendmsg for slab pages (bsc#1118316).
- libertas: call into generic suspend code before turning off power (bsc#1051510).
- libertas: do not set URB_ZERO_PACKET on IN USB transfer (bsc#1051510).
- libnvdimm, badrange: remove a WARN for list_empty (bsc#1112128).
- libnvdimm, dimm: Maximize label transfer size (bsc#1111921, bsc#1113408, bsc#1113972).
- libnvdimm: Hold reference on parent while scheduling async init (bsc#1116891).
- libnvdimm: Introduce locked DIMM capacity support (bsc#1112128).
- libnvdimm, label: change nvdimm_num_label_slots per UEFI 2.7 (bsc#1111921, bsc#1113408, bsc#1113972).
- libnvdimm, label: Fix sparse warning (bsc#1111921, bsc#1113408, bsc#1113972).
- libnvdimm: move poison list functions to a new 'badrange' file (bsc#1112128).
- libnvdimm/nfit_test: add firmware download emulation (bsc#1112128).
- libnvdimm/nfit_test: adding support for unit testing enable LSS status (bsc#1112128).
- libnvdimm, region: Fail badblocks listing for inactive regions (bsc#1116899).
- libnvdimm, testing: Add emulation for smart injection commands (bsc#1112128).
- libnvdimm, testing: update the default smart ctrl_temperature (bsc#1112128).
- lib/ubsan: add type mismatch handler for new GCC/Clang (bsc#1051510).
- lib/ubsan.c: s/missaligned/misaligned/ (bsc#1051510).
- livepatch: create and include UAPI headers ().
- llc: set SOCK_RCU_FREE in llc_sap_add_socket() (networking-stable-18_11_02).
- lockd: fix 'list_add double add' caused by legacy signal interface (git-fixes).
- loop: add recursion validation to LOOP_CHANGE_FD (bsc#1112711).
- loop: do not call into filesystem while holding lo_ctl_mutex (bsc#1112710).
- loop: fix LOOP_GET_STATUS lock imbalance (bsc#1113284).
- mac80211: Always report TX status (bsc#1051510).
- mac80211: fix TX status reporting for ieee80211s (bsc#1051510).
- mac80211_hwsim: do not omit multicast announce of first added radio (bsc#1051510).
- mac80211: minstrel: fix using short preamble CCK rates on HT clients (bsc#1051510).
- mac80211: TDLS: fix skb queue/priority assignment (bsc#1051510).
- mach64: detect the dot clock divider correctly on sparc (bsc#1051510).
- mach64: fix display corruption on big endian machines (bsc#1113722)
- mach64: fix image corruption due to reading accelerator registers (bsc#1113722)
- mailbox: PCC: handle parse error (bsc#1051510).
- make sure that __dentry_kill() always invalidates d_seq, unhashed or not (git-fixes).
- md: allow metadata updates while suspending an array - fix (git-fixes).
- MD: fix invalid stored role for a disk - try2 (git-fixes).
- md: fix NULL dereference of mddev->pers in remove_and_add_spares() (git-fixes).
- md/raid10: fix that replacement cannot complete recovery after reassemble (git-fixes).
- md/raid1: add error handling of read error from FailFast device (git-fixes).
- md/raid5-cache: disable reshape completely (git-fixes).
- md/raid5: fix data corruption of replacements after originals dropped (git-fixes).
- media: af9035: prevent buffer overflow on write (bsc#1051510).
- media: cx231xx: fix potential sign-extension overflow on large shift (bsc#1051510).
- media: dvb: fix compat ioctl translation (bsc#1051510).
- media: em28xx: fix input name for Terratec AV 350 (bsc#1051510).
- media: em28xx: use a default format if TRY_FMT fails (bsc#1051510).
- media: pci: cx23885: handle adding to list failure (bsc#1051510).
- media: tvp5150: avoid going past array on v4l2_querymenu() (bsc#1051510).
- media: tvp5150: fix switch exit in set control handler (bsc#1051510).
- media: tvp5150: fix width alignment during set_selection() (bsc#1051510).
- media: uvcvideo: Fix uvc_alloc_entity() allocation alignment (bsc#1051510).
- media: v4l2-tpg: fix kernel oops when enabling HFLIP and OSD (bsc#1051510).
- media: vsp1: Fix YCbCr planar formats pitch calculation (bsc#1051510).
- memory_hotplug: cond_resched in __remove_pages (bnc#1114178).
- mfd: arizona: Correct calling of runtime_put_sync (bsc#1051510).
- mfd: menelaus: Fix possible race condition and leak (bsc#1051510).
- mfd: omap-usb-host: Fix dts probe of children (bsc#1051510).
- mlxsw: spectrum: Fix IP2ME CPU policer configuration (networking-stable-18_11_21).
- mmc: block: avoid multiblock reads for the last sector in SPI mode (bsc#1051510).
- mmc: dw_mmc-rockchip: correct property names in debug (bsc#1051510).
- mmc: sdhci-pci-o2micro: Add quirk for O2 Micro dev 0x8620 rev 0x01 (bsc#1051510).
- mm: handle no memcg case in memcg_kmem_charge() properly (bnc#1113677).
- mm/migrate: Use spin_trylock() while resetting rate limit ().
- mm: /proc/pid/pagemap: hide swap entries from unprivileged users (Git-fixes bsc#1109907).
- mm: rework memcg kernel stack accounting (bnc#1113677).
- modpost: ignore livepatch unresolved relocations ().
- mount: Do not allow copying MNT_UNBINDABLE|MNT_LOCKED mounts (bsc#1117819).
- mount: Prevent MNT_DETACH from disconnecting locked mounts (bsc#1117820).
- mount: Retest MNT_LOCKED in do_umount (bsc#1117818).
- move changes without Git-commit out of sorted section
- neighbour: confirm neigh entries when ARP packet is received (networking-stable-18_09_24).
- net/af_iucv: drop inbound packets with invalid flags (bnc#1113501, LTC#172679).
- net/af_iucv: fix skb handling on HiperTransport xmit error (bnc#1113501, LTC#172679).
- net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT (networking-stable-18_09_24).
- net: aquantia: memory corruption on jumbo frames (networking-stable-18_10_16).
- net: bcmgenet: Poll internal PHY for GENETv5 (networking-stable-18_11_02).
- net: bcmgenet: protect stop from timeout (networking-stable-18_11_21).
- net: bcmgenet: use MAC link status for fixed phy (networking-stable-18_09_11).
- net: bridge: remove ipv6 zero address check in mcast queries (git-fixes).
- net: dsa: bcm_sf2: Call setup during switch resume (networking-stable-18_10_16).
- net: dsa: bcm_sf2: Fix unbind ordering (networking-stable-18_10_16).
- net: ena: add functions for handling Low Latency Queues in ena_com (bsc#1111696 bsc#1117561).
- net: ena: add functions for handling Low Latency Queues in ena_netdev (bsc#1111696 bsc#1117561).
- net: ena: change rx copybreak default to reduce kernel memory pressure (bsc#1111696 bsc#1117561).
- net: ena: complete host info to match latest ENA spec (bsc#1111696 bsc#1117561).
- net: ena: enable Low Latency Queues (bsc#1111696 bsc#1117561).
- net: ena: explicit casting and initialization, and clearer error handling (bsc#1111696 bsc#1117561).
- net: ena: fix auto casting to boolean (bsc#1111696 bsc#1117561).
- net: ena: fix compilation error in xtensa architecture (bsc#1111696 bsc#1117561).
- net: ena: fix crash during failed resume from hibernation (bsc#1111696 bsc#1117561).
- net: ena: fix indentations in ena_defs for better readability (bsc#1111696 bsc#1117561).
- net: ena: Fix Kconfig dependency on X86 (bsc#1111696 bsc#1117561).
- net: ena: fix NULL dereference due to untimely napi initialization (bsc#1111696 bsc#1117561).
- net: ena: fix rare bug when failed restart/resume is followed by driver removal (bsc#1111696 bsc#1117561).
- net: ena: fix warning in rmmod caused by double iounmap (bsc#1111696 bsc#1117561).
- net: ena: introduce Low Latency Queues data structures according to ENA spec (bsc#1111696 bsc#1117561).
- net: ena: limit refill Rx threshold to 256 to avoid latency issues (bsc#1111696 bsc#1117561).
- net: ena: minor performance improvement (bsc#1111696 bsc#1117561).
- net: ena: remove ndo_poll_controller (bsc#1111696 bsc#1117561).
- net: ena: remove redundant parameter in ena_com_admin_init() (bsc#1111696 bsc#1117561).
- net: ena: update driver version to 2.0.1 (bsc#1111696 bsc#1117561).
- net: ena: use CSUM_CHECKED device indication to report skb's checksum status (bsc#1111696 bsc#1117561).
- net: fec: do not dump RX FIFO register when not available (networking-stable-18_11_02).
- net-gro: reset skb->pkt_type in napi_reuse_skb() (networking-stable-18_11_21).
- net: hns: fix for unmapping problem when SMMU is on (networking-stable-18_10_16).
- net: hp100: fix always-true check for link up state (networking-stable-18_09_24).
- net: ibm: fix return type of ndo_start_xmit function ().
- net/ibmnvic: Fix deadlock problem in reset ().
- net/ibmvnic: Fix RTNL deadlock during device reset (bnc#1115431).
- net: ipmr: fix unresolved entry dumps (networking-stable-18_11_02).
- net: ipv4: do not let PMTU updates increase route MTU (git-fixes).
- net/ipv6: Display all addresses in output of /proc/net/if_inet6 (networking-stable-18_10_16).
- net/ipv6: Fix index counter for unicast addresses in in6_dump_addrs (networking-stable-18_11_02).
- netlabel: check for IPV4MASK in addrinfo_get (networking-stable-18_10_16).
- net: macb: do not disable MDIO bus at open/close time (networking-stable-18_09_11).
- net/mlx5: Check for error in mlx5_attach_interface (networking-stable-18_09_18).
- net/mlx5e: Fix selftest for small MTUs (networking-stable-18_11_21).
- net/mlx5e: Set vlan masks for all offloaded TC rules (networking-stable-18_10_16).
- net/mlx5: E-Switch, Fix memory leak when creating switchdev mode FDB tables (networking-stable-18_09_18).
- net/mlx5: E-Switch, Fix out of bound access when setting vport rate (networking-stable-18_10_16).
- net/mlx5: Fix debugfs cleanup in the device init/remove flow (networking-stable-18_09_18).
- net/mlx5: Fix use-after-free in self-healing flow (networking-stable-18_09_18).
- net/mlx5: Take only bit 24-26 of wqe.pftype_wq for page fault type (networking-stable-18_11_02).
- net: mvpp2: Extract the correct ethtype from the skb for tx csum offload (networking-stable-18_10_16).
- net: mvpp2: fix a txq_done race condition (networking-stable-18_10_16).
- net/packet: fix packet drop as of virtio gso (networking-stable-18_10_16).
- net: phy: mdio-gpio: Fix working over slow can_sleep GPIOs (networking-stable-18_11_21).
- net: qca_spi: Fix race condition in spi transfers (networking-stable-18_09_18).
- net: qmi_wwan: add Wistron Neweb D19Q1 (bsc#1051510).
- net: sched: action_ife: take reference to meta module (networking-stable-18_09_11).
- net/sched: act_pedit: fix dump of extended layered op (networking-stable-18_09_11).
- net/sched: act_sample: fix NULL dereference in the data path (networking-stable-18_09_24).
- net: sched: Fix for duplicate class dump (networking-stable-18_11_02).
- net: sched: Fix memory exposure from short TCA_U32_SEL (networking-stable-18_09_11).
- net: sched: gred: pass the right attribute to gred_change_table_def() (networking-stable-18_11_02).
- net: smsc95xx: Fix MTU range (networking-stable-18_11_21).
- net: socket: fix a missing-check bug (networking-stable-18_11_02).
- net: stmmac: Fix stmmac_mdio_reset() when building stmmac as modules (networking-stable-18_11_02).
- net: stmmac: Fixup the tail addr setting in xmit path (networking-stable-18_10_16).
- net: systemport: Fix wake-up interrupt race during resume (networking-stable-18_10_16).
- net: systemport: Protect stop from timeout (networking-stable-18_11_21).
- net: udp: fix handling of CHECKSUM_COMPLETE packets (networking-stable-18_11_02).
- net/usb: cancel pending work when unbinding smsc75xx (networking-stable-18_10_16).
- NFC: nfcmrvl_uart: fix OF child-node lookup (bsc#1051510).
- nfit_test: add error injection DSMs (bsc#1112128).
- nfit_test: fix buffer overrun, add sanity check (bsc#1112128).
- nfit_test: improve structure offset handling (bsc#1112128).
- nfit_test: prevent parsing error of nfit_test.0 (bsc#1112128).
- nfit_test: when clearing poison, also remove badrange entries (bsc#1112128).
- nfp: wait for posted reconfigs when disabling the device (networking-stable-18_09_11).
- NFS: Avoid quadratic search when freeing delegations (bsc#1084760).
- NFS: Avoid RCU usage in tracepoints (git-fixes).
- NFS: commit direct writes even if they fail partially (git-fixes).
- nfsd4: permit layoutget of executable-only files (git-fixes).
- nfsd: check for use of the closed special stateid (git-fixes).
- nfsd: CLOSE SHOULD return the invalid special stateid for NFSv4.x (x>0) (git-fixes).
- nfsd: deal with revoked delegations appropriately (git-fixes).
- nfsd: Ensure we check stateid validity in the seqid operation checks (git-fixes).
- nfsd: Fix another OPEN stateid race (git-fixes).
- nfsd: fix corrupted reply to badly ordered compound (git-fixes).
- nfsd: fix potential use-after-free in nfsd4_decode_getdeviceinfo (git-fixes).
- nfsd: Fix stateid races between OPEN and CLOSE (git-fixes).
- NFS: do not wait on commit in nfs_commit_inode() if there were no commit requests (git-fixes).
- nfsd: restrict rd_maxcount to svc_max_payload in nfsd_encode_readdir (git-fixes).
- NFS: Ensure we commit after writeback is complete (bsc#1111809).
- NFS: Fix an incorrect type in struct nfs_direct_req (git-fixes).
- NFS: Fix a typo in nfs_rename() (git-fixes).
- NFS: Fix typo in nomigration mount option (git-fixes).
- NFS: Fix unstable write completion (git-fixes).
- NFSv4.0 fix client reference leak in callback (git-fixes).
- NFSv4.1: Fix a potential layoutget/layoutrecall deadlock (git-fixes).
- NFSv4.1 fix infinite loop on I/O (git-fixes).
- NFSv4.1: Fix the client behaviour on NFS4ERR_SEQ_FALSE_RETRY (git-fixes).
- NFSv4.1: Fix up replays of interrupted requests (git-fixes).
- NFSv4: Fix a typo in nfs41_sequence_process (git-fixes).
- nl80211: Fix possible Spectre-v1 for CQM RSSI thresholds (bsc#1051510).
- nl80211: Fix possible Spectre-v1 for NL80211_TXRATE_HT (bsc#1051510).
- nospec: Include <asm/barrier.h> dependency (bsc#1114279).
- nvdimm: Clarify comment in sizeof_namespace_index (bsc#1111921, bsc#1113408, bsc#1113972).
- nvdimm: Remove empty if statement (bsc#1111921, bsc#1113408, bsc#1113972).
- nvdimm: Sanity check labeloff (bsc#1111921, bsc#1113408, bsc#1113972).
- nvdimm: Split label init out from the logic for getting config data (bsc#1111921, bsc#1113408, bsc#1113972).
- nvdimm: Use namespace index data to reduce number of label reads needed (bsc#1111921, bsc#1113408, bsc#1113972).
- nvme: Free ctrl device name on init failure ().
- ocfs2: fix a misuse a of brelse after failing ocfs2_check_dir_entry (bsc#1117817).
- ocfs2: fix locking for res->tracking and dlm->tracking_list (bsc#1117816).
- ocfs2: fix ocfs2 read block panic (bsc#1117815).
- ocfs2: free up write context when direct IO failed (bsc#1117821).
- ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent (bsc#1117808).
- of: add helper to lookup compatible child node (bsc#1106110)
- openvswitch: Fix push/pop ethernet validation (networking-stable-18_11_02).
- orangefs: fix deadlock; do not write i_size in read_iter (bsc#1051510).
- orangefs: initialize op on loop restart in orangefs_devreq_read (bsc#1051510).
- orangefs_kill_sb(): deal with allocation failures (bsc#1051510).
- orangefs: use list_for_each_entry_safe in purge_waiting_ops (bsc#1051510).
- PCI: Add Device IDs for Intel GPU 'spurious interrupt' quirk (bsc#1051510).
- PCI/ASPM: Do not initialize link state when aspm_disabled is set (bsc#1051510).
- PCI/ASPM: Fix link_state teardown on device removal (bsc#1051510).
- PCI: dwc: remove duplicate fix References: bsc#1115269 Patch has been already applied by the following commit: 9f73db8b7c PCI: dwc: Fix enumeration end when reaching root subordinate (bsc#1051510)
- PCI: hv: Do not wait forever on a device that has disappeared (bsc#1109806).
- PCI: hv: Use effective affinity mask (bsc#1109772).
- PCI: imx6: Fix link training status detection in link up check (bsc#1109806).
- PCI: iproc: Remove PAXC slot check to allow VF support (bsc#1109806).
- PCI/MSI: Warn and return error if driver enables MSI/MSI-X twice (bsc#1051510).
- PCI: Reprogram bridge prefetch registers on resume (bsc#1051510).
- PCI: vmd: Assign vector zero to all bridges (bsc#1109806).
- PCI: vmd: Detach resources after stopping root bus (bsc#1109806).
- PCI: vmd: White list for fast interrupt handlers (bsc#1109806).
- pcmcia: Implement CLKRUN protocol disabling for Ricoh bridges (bsc#1051510).
- percpu: make this_cpu_generic_read() atomic w.r.t. interrupts (bsc#1114279).
- perf: fix invalid bit in diagnostic entry (git-fixes).
- pinctrl: at91-pio4: fix has_config check in atmel_pctl_dt_subnode_to_map() (bsc#1051510).
- pinctrl: meson: fix pinconf bias disable (bsc#1051510).
- pinctrl: qcom: spmi-mpp: Fix drive strength setting (bsc#1051510).
- pinctrl: qcom: spmi-mpp: Fix err handling of pmic_mpp_set_mux (bsc#1051510).
- pinctrl: spmi-mpp: Fix pmic_mpp_config_get() to be compliant (bsc#1051510).
- pinctrl: ssbi-gpio: Fix pm8xxx_pin_config_get() to be compliant (bsc#1051510).
- pipe: match pipe_max_size data type with procfs (git-fixes).
- platform/x86: acerhdf: Add BIOS entry for Gateway LT31 v1.3307 (bsc#1051510).
- platform/x86: intel_telemetry: report debugfs failure (bsc#1051510).
- pNFS: Always free the session slot on error in nfs4_layoutget_handle_exception (git-fixes).
- pNFS: Do not release the sequence slot until we've processed layoutget on open (git-fixes).
- pNFS: Prevent the layout header refcount going to zero in pnfs_roc() (git-fixes).
- powerpc/64s/hash: Do not use PPC_INVALIDATE_ERAT on CPUs before POWER9 (bsc#1065729).
- powerpc/boot: Fix opal console in boot wrapper (bsc#1065729).
- powerpc/kvm/booke: Fix altivec related build break (bsc#1061840).
- powerpc/kvm: Switch kvm pmd allocator to custom allocator (bsc#1061840).
- powerpc/mm: Fix typo in comments (bsc#1065729).
- powerpc/mm/hugetlb: initialize the pagetable cache correctly for hugetlb (bsc#1091800).
- powerpc/mm/keys: Move pte bits to correct headers (bsc#1078248).
- powerpc/mm: Rename find_linux_pte_or_hugepte() (bsc#1061840).
- powerpc/npu-dma.c: Fix crash after __mmu_notifier_register failure (bsc#1055120).
- powerpc/perf: Update raw-event code encoding comment for power8 (bsc#1065729).
- powerpc/powernv: Add indirect levels to it_userspace (bsc#1061840).
- powerpc/powernv: Do not select the cpufreq governors (bsc#1065729).
- powerpc/powernv: Fix concurrency issue with npu->mmio_atsd_usage (bsc#1055120).
- powerpc/powernv: Fix opal_event_shutdown() called with interrupts disabled (bsc#1065729).
- powerpc/powernv/ioda2: Reduce upper limit for DMA window size (bsc#1055120).
- powerpc/powernv/ioda: Allocate indirect TCE levels on demand (bsc#1061840).
- powerpc/powernv/ioda: Finish removing explicit max window size check (bsc#1061840).
- powerpc/powernv/ioda: Remove explicit max window size check (bsc#1061840).
- powerpc/powernv: Move TCE manupulation code to its own file (bsc#1061840).
- powerpc/powernv/npu: Add lock to prevent race in concurrent context init/destroy (bsc#1055120).
- powerpc/powernv/npu: Do not explicitly flush nmmu tlb (bsc#1055120).
- powerpc/powernv/npu: Fix deadlock in mmio_invalidate() (bsc#1055120).
- powerpc/powernv/npu: Prevent overwriting of pnv_npu2_init_contex() callback parameters (bsc#1055120).
- powerpc/powernv/npu: Use flush_all_mm() instead of flush_tlb_mm() (bsc#1055120).
- powerpc/powernv/pci: Work around races in PCI bridge enabling (bsc#1055120).
- powerpc/powernv: Rework TCE level allocation (bsc#1061840).
- powerpc/pseries: Fix build break for SPLPAR=n and CPU hotplug (bsc#1079524, git-fixes).
- powerpc/pseries: Fix CONFIG_NUMA=n build (bsc#1067906, git-fixes).
- powerpc/pseries: Fix DTL buffer registration (bsc#1065729).
- powerpc/pseries: Fix how we iterate over the DTL entries (bsc#1065729).
- powerpc/pseries: Fix 'OF: ERROR: Bad of_node_put() on /cpus' during DLPAR (bsc#1113295).
- powerpc/pseries/mobility: Extend start/stop topology update scope (bsc#1116950, bsc#1115709).
- powerpc: pseries: remove dlpar_attach_node dependency on full path (bsc#1113295).
- powerpc/xive: Move definition of ESB bits (bsc#1061840).
- powerpc/xmon: Add ISA v3.0 SPRs to SPR dump (bsc#1061840).
- power: supply: max8998-charger: Fix platform data retrieval (bsc#1051510).
- pppoe: fix reception of frames with no mac header (networking-stable-18_09_24).
- printk: drop in_nmi check from printk_safe_flush_on_panic() (bsc#1112170).
- printk: Fix panic caused by passing log_buf_len to command line (bsc#1117168).
- printk/tracing: Do not trace printk_nmi_enter() (bsc#1112208).
- provide linux/set_memory.h (bsc#1113295).
- ptp: fix Spectre v1 vulnerability (bsc#1051510).
- pwm: lpss: Release runtime-pm reference from the driver's remove callback (bsc#1051510).
- pxa168fb: prepare the clock (bsc#1051510).
- qmi_wwan: Added support for Gemalto's Cinterion ALASxx WWAN interface (bsc#1051510).
- qmi_wwan: apply SET_DTR quirk to the SIMCOM shared device ID (bsc#1051510).
- qmi_wwan: Support dynamic config on Quectel EP06 (bsc#1051510).
- qrtr: add MODULE_ALIAS macro to smd (bsc#1051510).
- r8169: Clear RTL_FLAG_TASK_*_PENDING when clearing RTL_FLAG_TASK_ENABLED (bsc#1051510).
- r8169: fix NAPI handling under high load (networking-stable-18_11_02).
- race of lockd inetaddr notifiers vs nlmsvc_rqst change (git-fixes).
- RAID10 BUG_ON in raise_barrier when force is true and conf->barrier is 0 (git-fixes).
- random: rate limit unseeded randomness warnings (git-fixes).
- rculist: add list_for_each_entry_from_rcu() (bsc#1084760).
- rculist: Improve documentation for list_for_each_entry_from_rcu() (bsc#1084760).
- rds: fix two RCU related problems (networking-stable-18_09_18).
- README: Clean-up trailing whitespace
- reiserfs: add check to detect corrupted directory entry (bsc#1109818).
- reiserfs: do not panic on bad directory entries (bsc#1109818).
- remoteproc: qcom: Fix potential device node leaks (bsc#1051510).
- rename a hv patch to reduce conflicts in -AZURE
- reset: hisilicon: fix potential NULL pointer dereference (bsc#1051510).
- reset: imx7: Fix always writing bits as 0 (bsc#1051510).
- resource: Include resource end in walk_*() interfaces (bsc#1114279).
- Revert 'ceph: fix dentry leak in splice_dentry()' (bsc#1114839).
- Revert 'powerpc/64: Fix checksum folding in csum_add()' (bsc#1065729).
- Revert 'rpm/kernel-binary.spec.in: allow unsupported modules for -extra'
- Revert 'usb: dwc3: gadget: skip Set/Clear Halt when invalid' (bsc#1051510).
- rpmsg: Correct support for MODULE_DEVICE_TABLE() (git-fixes).
- rtnetlink: Disallow FDB configuration for non-Ethernet device (networking-stable-18_11_02).
- rtnetlink: fix rtnl_fdb_dump() for ndmsg header (networking-stable-18_10_16).
- rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096 (networking-stable-18_10_16).
- s390/cpum_sf: Add data entry sizes to sampling trailer entry (git-fixes).
- s390/kvm: fix deadlock when killed by oom (bnc#1113501, LTC#172235).
- s390/mm: Check for valid vma before zapping in gmap_discard (git-fixes).
- s390/mm: correct allocate_pgste proc_handler callback (git-fixes).
- s390: qeth_core_mpc: Use ARRAY_SIZE instead of reimplementing its function (bnc#1113501, LTC#172682).
- s390/qeth: fix HiperSockets sniffer (bnc#1113501, LTC#172953).
- s390: qeth: Fix potential array overrun in cmd/rc lookup (bnc#1113501, LTC#172682).
- s390/qeth: handle failure on workqueue creation (git-fixes).
- s390/qeth: report 25Gbit link speed (bnc#1113501, LTC#172959).
- s390: revert ELF_ET_DYN_BASE base changes (git-fixes).
- s390/sclp_tty: enable line mode tty even if there is an ascii console (git-fixes).
- s390/sthyi: add cache to store hypervisor info (LTC#160415, bsc#1068273).
- s390/sthyi: add s390_sthyi system call (LTC#160415, bsc#1068273).
- s390/sthyi: reorganize sthyi implementation (LTC#160415, bsc#1068273).
- sched/numa: Limit the conditions where scan period is reset ().
- scsi: core: Allow state transitions from OFFLINE to BLOCKED (bsc#1112246).
- scsi: core: Allow state transitions from OFFLINE to BLOCKED (bsc#1112246).
- scsi: core: Avoid that SCSI device removal through sysfs triggers a deadlock (bsc#1114578).
- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1104731).
- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1104731).
- scsi: libfc: retry PRLI if we cannot analyse the payload (bsc#1104731).
- scsi: libfc: retry PRLI if we cannot analyse the payload (bsc#1104731).
- scsi: libsas: remove irq save in sas_ata_qc_issue() (bsc#1114580).
- scsi: lpfc: add support to retrieve firmware logs (bsc#1114015).
- scsi: lpfc: add Trunking support (bsc#1114015).
- scsi: lpfc: Correct errors accessing fw log (bsc#1114015).
- scsi: lpfc: Correct invalid EQ doorbell write on if_type=6 (bsc#1114015).
- scsi: lpfc: Correct irq handling via locks when taking adapter offline (bsc#1114015).
- scsi: lpfc: Correct LCB RJT handling (bsc#1114015).
- scsi: lpfc: Correct loss of fc4 type on remote port address change (bsc#1114015).
- scsi: lpfc: Correct race with abort on completion path (bsc#1114015).
- scsi: lpfc: Correct soft lockup when running mds diagnostics (bsc#1114015).
- scsi: lpfc: Correct speeds on SFP swap (bsc#1114015).
- scsi: lpfc: fcoe: Fix link down issue after 1000+ link bounces (bsc#1114015).
- scsi: lpfc: Fix errors in log messages (bsc#1114015).
- scsi: lpfc: Fix GFT_ID and PRLI logic for RSCN (bsc#1114015).
- scsi: lpfc: Fix LOGO/PLOGI handling when triggerd by ABTS Timeout event (bsc#1114015).
- scsi: lpfc: Fix lpfc_sli4_read_config return value check (bsc#1114015).
- scsi: lpfc: Fix odd recovery in duplicate FLOGIs in point-to-point (bsc#1114015).
- scsi: lpfc: Implement GID_PT on Nameserver query to support faster failover (bsc#1114015).
- scsi: lpfc: Raise nvme defaults to support a larger io and more connectivity (bsc#1114015).
- scsi: lpfc: raise sg count for nvme to use available sg resources (bsc#1114015).
- scsi: lpfc: reduce locking when updating statistics (bsc#1114015).
- scsi: lpfc: Remove set but not used variable 'sgl_size' (bsc#1114015).
- scsi: lpfc: Reset link or adapter instead of doing infinite nameserver PLOGI retry (bsc#1114015).
- scsi: lpfc: Synchronize access to remoteport via rport (bsc#1114015).
- scsi: lpfc: update driver version to 12.0.0.7 (bsc#1114015).
- scsi: lpfc: update driver version to 12.0.0.8 (bsc#1114015).
- scsi: qlogicpti: Fix an error handling path in 'qpti_sbus_probe()' (bsc#1114581).
- scsi: scsi_transport_srp: Fix shost to rport translation (bsc#1114582).
- scsi: sg: fix minor memory leak in error path (bsc#1114584).
- scsi: sysfs: Introduce sysfs_{un,}break_active_protection() (bsc#1114578).
- scsi: target: Fix fortify_panic kernel exception (bsc#1114576).
- scsi: target/tcm_loop: Avoid that static checkers warn about dead code (bsc#1114577).
- scsi: target: tcmu: add read length support (bsc#1097755).
- sctp: fix race on sctp_id2asoc (networking-stable-18_11_02).
- sctp: fix strchange_flags name for Stream Change Event (networking-stable-18_11_21).
- sctp: hold transport before accessing its asoc in sctp_transport_get_next (networking-stable-18_09_11).
- sctp: not allow to set asoc prsctp_enable by sockopt (networking-stable-18_11_21).
- sctp: not increase stream's incnt before sending addstrm_in request (networking-stable-18_11_21).
- sctp: update dst pmtu with the correct daddr (networking-stable-18_10_16).
- serial: 8250: Fix clearing FIFOs in RS485 mode again (bsc#1051510).
- signal: Properly deliver SIGSEGV from x86 uprobes (bsc#1110006).
- skip LAYOUTRETURN if layout is invalid (git-fixes).
- smb2: fix missing files in root share directory listing (bsc#1112907).
- smb2: fix missing files in root share directory listing (bsc#1112907).
- smb3: fill in statfs fsid and correct namelen (bsc#1112905).
- smb3: fill in statfs fsid and correct namelen (bsc#1112905).
- smb3: fix reset of bytes read and written stats (bsc#1112906).
- smb3: fix reset of bytes read and written stats (bsc#1112906).
- smb3: on reconnect set PreviousSessionId field (bsc#1112899).
- smb3: on reconnect set PreviousSessionId field (bsc#1112899).
- soc: fsl: qbman: qman: avoid allocating from non existing gen_pool (bsc#1051510).
- soc/tegra: pmc: Fix child-node lookup (bsc#1051510).
- soc: ti: QMSS: Fix usage of irq_set_affinity_hint (bsc#1051510).
- sound: do not call skl_init_chip() to reset intel skl soc (bsc#1051510).
- sound: enable interrupt after dma buffer initialization (bsc#1051510).
- spi/bcm63xx-hsspi: keep pll clk enabled (bsc#1051510).
- spi: bcm-qspi: switch back to reading flash using smaller chunks (bsc#1051510).
- spi: sh-msiof: fix deferred probing (bsc#1051510).
- staging: comedi: ni_mio_common: protect register write overflow (bsc#1051510).
- staging:iio:ad7606: fix voltage scales (bsc#1051510).
- staging: rtl8723bs: Fix the return value in case of error in 'rtw_wx_read32()' (bsc#1051510).
- staging: vchiq_arm: fix compat VCHIQ_IOC_AWAIT_COMPLETION (bsc#1051510).
- sunrpc: Allow connect to return EHOSTUNREACH (git-fixes).
- sunrpc: Do not use stack buffer with scatterlist (git-fixes).
- sunrpc: Fix rpc_task_begin trace point (git-fixes).
- sunrpc: Fix tracepoint storage issues with svc_recv and svc_rqst_status (git-fixes).
- target: fix buffer offset in core_scsi3_pri_read_full_status (bsc1117349).
- target: log Data-Out timeouts as errors (bsc#1095805).
- target: log NOP ping timeouts as errors (bsc#1095805).
- target: split out helper for cxn timeout error stashing (bsc#1095805).
- target: stash sess_err_stats on Data-Out timeout (bsc#1095805).
- target: use ISCSI_IQN_LEN in iscsi_target_stat (bsc#1095805).
- tcp: do not restart timewait timer on rst reception (networking-stable-18_09_11).
- test_firmware: fix error return getting clobbered (bsc#1051510).
- tg3: Add PHY reset for 5717/5719/5720 in change ring and flow control paths (networking-stable-18_11_21).
- thermal: bcm2835: enable hwmon explicitly (bsc#1108468).
- thermal: da9062/61: Prevent hardware access during system suspend (bsc#1051510).
- thermal: rcar_thermal: Prevent hardware access during system suspend (bsc#1051510).
- tipc: do not assume linear buffer when reading ancillary data (networking-stable-18_11_21).
- tipc: fix a missing rhashtable_walk_exit() (networking-stable-18_09_11).
- tipc: fix flow control accounting for implicit connect (networking-stable-18_10_16).
- tools build: fix # escaping in .cmd files for future Make (git-fixes).
- tools/testing/nvdimm: advertise a write cache for nfit_test (bsc#1112128).
- tools/testing/nvdimm: allow custom error code injection (bsc#1112128).
- tools/testing/nvdimm: disable labels for nfit_test.1 (bsc#1112128).
- tools/testing/nvdimm: enable labels for nfit_test.1 dimms (bsc#1112128).
- tools/testing/nvdimm: fix missing newline in nfit_test_dimm 'handle' attribute (bsc#1112128).
- tools/testing/nvdimm: Fix support for emulating controller temperature (bsc#1112128).
- tools/testing/nvdimm: force nfit_test to depend on instrumented modules (bsc#1112128).
- tools/testing/nvdimm: improve emulation of smart injection (bsc#1112128).
- tools/testing/nvdimm: kaddr and pfn can be NULL to ->direct_access() (bsc#1112128).
- tools/testing/nvdimm: Make DSM failure code injection an override (bsc#1112128).
- tools/testing/nvdimm: smart alarm/threshold control (bsc#1112128).
- tools/testing/nvdimm: stricter bounds checking for error injection commands (bsc#1112128).
- tools/testing/nvdimm: support nfit_test_dimm attributes under nfit_test.1 (bsc#1112128).
- tools/testing/nvdimm: unit test clear-error commands (bsc#1112128).
- tools/vm/page-types.c: fix 'defined but not used' warning (bsc#1051510).
- tools/vm/slabinfo.c: fix sign-compare warning (bsc#1051510).
- tpm2-cmd: allow more attempts for selftest execution (bsc#1082555).
- tpm: add retry logic (bsc#1082555).
- tpm: consolidate the TPM startup code (bsc#1082555).
- tpm: do not suspend/resume if power stays on (bsc#1082555).
- tpm: fix intermittent failure with self tests (bsc#1082555).
- tpm: fix response size validation in tpm_get_random() (bsc#1082555).
- tpm: move endianness conversion of ordinals to tpm_input_header (bsc#1082555).
- tpm: move endianness conversion of TPM_TAG_RQU_COMMAND to tpm_input_header (bsc#1082555).
- tpm: move the delay_msec increment after sleep in tpm_transmit() (bsc#1082555).
- tpm: React correctly to RC_TESTING from TPM 2.0 self tests (bsc#1082555).
- tpm: replace msleep() with usleep_range() in TPM 1.2/2.0 generic drivers (bsc#1082555).
- tpm: Restore functionality to xen vtpm driver (bsc#1082555).
- tpm: self test failure should not cause suspend to fail (bsc#1082555).
- tpm: tpm-interface: fix tpm_transmit/_cmd kdoc (bsc#1082555).
- tpm: Trigger only missing TPM 2.0 self tests (bsc#1082555).
- tpm: Use dynamic delay to wait for TPM 2.0 self test result (bsc#1082555).
- tpm: use tpm2_pcr_read() in tpm2_do_selftest() (bsc#1082555).
- tpm: use tpm_buf functions in tpm2_pcr_read() (bsc#1082555).
- tracing: Add barrier to trace_printk() buffer nesting modification (bsc#1112219).
- tracing: Apply trace_clock changes to instance max buffer (bsc#1117188).
- tracing: Erase irqsoff trace with empty write (bsc#1117189).
- tty: check name length in tty_find_polling_driver() (bsc#1051510).
- tty: Do not block on IO when ldisc change is pending (bnc#1105428).
- tty: fix data race between tty_init_dev and flush of buf (bnc#1105428).
- tty: Hold tty_ldisc_lock() during tty_reopen() (bnc#1105428).
- tty/ldsem: Add lockdep asserts for ldisc_sem (bnc#1105428).
- tty/ldsem: Convert to regular lockdep annotations (bnc#1105428).
- tty/ldsem: Decrement wait_readers on timeouted down_read() (bnc#1105428).
- tty/ldsem: Wake up readers after timed out down_write() (bnc#1105428).
- tty: Simplify tty->count math in tty_reopen() (bnc#1105428).
- tty: wipe buffer (bsc#1051510).
- tty: wipe buffer if not echoing data (bsc#1051510).
- tun: Consistently configure generic netdev params via rtnetlink (bsc#1051510).
- tuntap: fix multiqueue rx (networking-stable-18_11_21).
- udp4: fix IP_CMSG_CHECKSUM for connected sockets (networking-stable-18_09_24).
- udp6: add missing checks on edumux packet processing (networking-stable-18_09_24).
- udp6: fix encap return code for resubmitting (git-fixes).
- uio: ensure class is registered before devices (bsc#1051510).
- uio: Fix an Oops on load (bsc#1051510).
- uio: make symbol 'uio_class_registered' static (bsc#1051510).
- Update config files. Enabled ENA (Amazon network driver) for arm64.
- usb: cdc-acm: add entry for Hiro (Conexant) modem (bsc#1051510).
- usb: chipidea: Prevent unbalanced IRQ disable (bsc#1051510).
- usb: core: Fix hub port connection events lost (bsc#1051510).
- usb: dwc2: host: do not delay retries for CONTROL IN transfers (bsc#1114385).
- usb: dwc2: host: Do not retry NAKed transactions right away (bsc#1114385).
- usb: dwc3: core: Clean up ULPI device (bsc#1051510).
- usb: dwc3: gadget: fix ISOC TRB type on unaligned transfers (bsc#1051510).
- usb: dwc3: gadget: Properly check last unaligned/zero chain TRB (bsc#1051510).
- usb: gadget: fsl_udc_core: check allocation return value and cleanup on failure (bsc#1051510).
- usb: gadget: fsl_udc_core: fixup struct_udc_setup documentation (bsc#1051510).
- usb: gadget: storage: Fix Spectre v1 vulnerability (bsc#1051510).
- usb: gadget: udc: atmel: handle at91sam9rl PMC (bsc#1051510).
- usb: gadget: u_ether: fix unsafe list iteration (bsc#1051510).
- usb: host: ohci-at91: fix request of irq for optional gpio (bsc#1051510).
- usbip: tools: fix atoi() on non-null terminated string (bsc#1051510).
- usbip:vudc: BUG kmalloc-2048 (Not tainted): Poison overwritten (bsc#1051510).
- usb: misc: appledisplay: add 20' Apple Cinema Display (bsc#1051510).
- usbnet: smsc95xx: disable carrier check while suspending (bsc#1051510).
- usb: omap_udc: fix rejection of out transfers when DMA is used (bsc#1051510).
- usb: quirks: Add delay-init quirk for Corsair K70 LUX RGB (bsc#1051510).
- usb: quirks: Add no-lpm quirk for Raydium touchscreens (bsc#1051510).
- usb: remove LPM management from usb_driver_claim_interface() (bsc#1051510).
- usb: serial: cypress_m8: fix interrupt-out transfer length (bsc#1051510).
- usb: serial: option: add two-endpoints device-id flag (bsc#1051510).
- usb: serial: option: drop redundant interface-class test (bsc#1051510).
- usb: serial: option: improve Quectel EP06 detection (bsc#1051510).
- usb: xhci: fix timeout for transition from RExit to U0 (bsc#1051510).
- userfaultfd: hugetlbfs: fix userfaultfd_huge_must_wait() pte access (bsc#1109739).
- Use upstream version of pci-hyperv patch (35a88a1)
- VFS: close race between getcwd() and d_move() (git-fixes).
- VFS: fix freeze protection in mnt_want_write_file() for overlayfs (git-fixes).
- vhost: Fix Spectre V1 vulnerability (bsc#1051510).
- vhost/scsi: truncate T10 PI iov_iter to prot_bytes (bsc#1051510).
- virtio_net: avoid using netif_tx_disable() for serializing tx routine (networking-stable-18_11_02).
- VMCI: Resource wildcard match fixed (bsc#1051510).
- w1: omap-hdq: fix missing bus unregister at removal (bsc#1051510).
- Workaround for mysterious NVMe breakage with i915 CFL (bsc#1111040).
- x86/acpi: Prevent X2APIC id 0xffffffff from being accounted (bsc#1110006).
- x86/boot/KASLR: Work around firmware bugs by excluding EFI_BOOT_SERVICES_* and EFI_LOADER_* from KASLR's choice (bnc#1112878).
- x86/boot: Move EISA setup to a separate file (bsc#1110006).
- x86/corruption-check: Fix panic in memory_corruption_check() when boot option without value is provided (bsc#1110006).
- x86/cpufeature: Add User-Mode Instruction Prevention definitions (bsc#1110006).
- x86/cpufeatures: Add Intel Total Memory Encryption cpufeature (bsc#1110006).
- x86/cpu/vmware: Do not trace vmware_sched_clock() (bsc#1114279).
- x86/eisa: Add missing include (bsc#1110006).
- x86/EISA: Do not probe EISA bus for Xen PV guests (bsc#1110006).
- x86/fpu: Remove second definition of fpu in __fpu__restore_sig() (bsc#1110006).
- x86, hibernate: Fix nosave_regions setup for hibernation (bsc#1110006).
- x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772).
- x86/kasan: Panic if there is not enough memory to boot (bsc#1110006).
- x86/kexec: Correct KEXEC_BACKUP_SRC_END off-by-one error (bsc#1114279).
- x86/ldt: Remove unused variable in map_ldt_struct() (bsc#1114279).
- x86/ldt: Split out sanity check in map_ldt_struct() (bsc#1114279).
- x86/ldt: Unmap PTEs for the slot before freeing LDT pages (bsc#1114279).
- x86/MCE/AMD: Fix the thresholding machinery initialization order (bsc#1114279).
- x86/MCE: Fix stack out-of-bounds write in mce-inject.c: Flags_read() (bsc#1110006).
- x86/MCE: Make correctable error detection look at the Deferred bit (bsc#1114279).
- x86/mm/pat: Disable preemption around __flush_tlb_all() (bsc#1114279).
- x86, nfit_test: Add unit test for memcpy_mcsafe() (bsc#1112128).
- x86/paravirt: Fix some warning messages (bnc#1065600).
- x86/percpu: Fix this_cpu_read() (bsc#1110006).
- x86/speculation: Support Enhanced IBRS on future CPUs ().
- x86/time: Correct the attribute on jiffies' definition (bsc#1110006).
- x86/xen: Fix boot loader version reported for PVH guests (bnc#1065600).
- xen/balloon: Support xend-based toolstack (bnc#1065600).
- xen/blkfront: avoid NULL blkfront_info dereference on device removal (bsc#1111062).
- xen: fix race in xen_qlock_wait() (bnc#1107256).
- xen: fix xen_qlock_wait() (bnc#1107256).
- xen/gntdev: avoid out of bounds access in case of partial gntdev_mmap() (bnc#1065600).
- xen: make xen_qlock_wait() nestable (bnc#1107256).
- xen/netfront: do not bug in case of too many frags (bnc#1104824).
- xen/pvh: do not try to unplug emulated devices (bnc#1065600).
- xen/pvh: increase early stack size (bnc#1065600).
- xen: Remove unnecessary BUG_ON from __unbind_from_irq() (bnc#1065600).
- xen-swiotlb: fix the check condition for xen_swiotlb_free_coherent (bnc#1065600).
- xen-swiotlb: use actually allocated size on check physical continuous (bnc#1065600).
- xen/x86: add diagnostic printout to xen_mc_flush() in case of error (bnc#1116183).
- xfrm: use complete IPv6 addresses for hash (bsc#1109330).
- xfs: do not fail when converting shortform attr to long form during ATTR_REPLACE (bsc#1105025).
- xfs: Fix error code in 'xfs_ioc_getbmap()' (git-fixes).
- xfs: Properly detect when DAX won't be used on any device (bsc#1115976).
- xhci: Add check for invalid byte size error when UAS devices are connected (bsc#1051510).
- xhci: Do not print a warning when setting link state for disabled ports (bsc#1051510).
- xhci: Fix leaking USB3 shared_hcd at xhci removal (bsc#1051510).
- xprtrdma: Do not defer fencing an async RPC's chunks (git-fixes).
Patchnames
SUSE-SLE-DESKTOP-12-SP4-2018-2894,SUSE-SLE-HA-12-SP4-2018-2894,SUSE-SLE-SDK-12-SP4-2018-2894,SUSE-SLE-SERVER-12-SP4-2018-2894,SUSE-SLE-WE-12-SP4-2018-2894
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).\n- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removed entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry could remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).\n- CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).\n- CVE-2018-18445: Faulty computation of numeric bounds in the BPF verifier permitted out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandled 32-bit right shifts (bnc#1112372).\n- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).\n- CVE-2017-18224: fs/ocfs2/aops.c omitted use of a semaphore and consequently had a race condition for access to the extent tree during read operations in DIRECT mode, which allowed local users to cause a denial of service (BUG) by modifying a certain e_cpos field (bnc#1084831).\n- CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674).\n\nThe following non-security bugs were fixed:\n\n- ACPI/APEI: Handle GSIV and GPIO notification types (bsc#1115567).\n- ACPICA: Tables: Add WSMT support (bsc#1089350).\n- ACPI/IORT: Fix iort_get_platform_device_domain() uninitialized pointer value (bsc#1051510).\n- ACPI / LPSS: Add alternative ACPI HIDs for Cherry Trail DMA controllers (bsc#1051510).\n- ACPI, nfit: Fix ARS overflow continuation (bsc#1116895).\n- ACPI, nfit: Prefer _DSM over _LSR for namespace label reads (bsc#1112128).\n- ACPI/nfit, x86/mce: Handle only uncorrectable machine checks (bsc#1114279).\n- ACPI/nfit, x86/mce: Validate a MCE's address before using it (bsc#1114279).\n- ACPI / platform: Add SMB0001 HID to forbidden_id_list (bsc#1051510).\n- ACPI / processor: Fix the return value of acpi_processor_ids_walk() (bsc#1051510).\n- ACPI / watchdog: Prefer iTCO_wdt always when WDAT table uses RTC SRAM (bsc#1051510).\n- act_ife: fix a potential use-after-free (networking-stable-18_09_11).\n- Add the cherry-picked dup id for PCI dwc fix\n- Add version information to KLP_SYMBOLS file\n- ALSA: ac97: Fix incorrect bit shift at AC97-SPSA control write (bsc#1051510).\n- ALSA: ca0106: Disable IZD on SB0570 DAC to fix audio pops (bsc#1051510).\n- ALSA: control: Fix race between adding and removing a user element (bsc#1051510).\n- ALSA: hda: Add 2 more models to the power_save blacklist (bsc#1051510).\n- ALSA: hda: Add ASRock N68C-S UCC the power_save blacklist (bsc#1051510).\n- ALSA: hda - Add mic quirk for the Lenovo G50-30 (17aa:3905) (bsc#1051510).\n- ALSA: hda - Add quirk for ASUS G751 laptop (bsc#1051510).\n- ALSA: hda/ca0132 - Call pci_iounmap() instead of iounmap() (bsc#1051510).\n- ALSA: hda - Fix headphone pin config for ASUS G751 (bsc#1051510).\n- ALSA: hda: fix unused variable warning (bsc#1051510).\n- ALSA: hda/realtek - Add auto-mute quirk for HP Spectre x360 laptop (bsc#1051510).\n- ALSA: hda/realtek - Add GPIO data update helper (bsc#1051510).\n- ALSA: hda/realtek - Allow skipping spec->init_amp detection (bsc#1051510).\n- ALSA: hda/realtek - fix headset mic detection for MSI MS-B171 (bsc#1051510).\n- ALSA: hda/realtek - Fix HP Headset Mic can't record (bsc#1051510).\n- ALSA: hda/realtek - fix the pop noise on headphone for lenovo laptops (bsc#1051510).\n- ALSA: hda/realtek - Fix the problem of the front MIC on the Lenovo M715 (bsc#1051510).\n- ALSA: hda/realtek - Manage GPIO bits commonly (bsc#1051510).\n- ALSA: hda/realtek - Simplify Dell XPS13 GPIO handling (bsc#1051510).\n- ALSA: hda/realtek - Support ALC300 (bsc#1051510).\n- ALSA: oss: Use kvzalloc() for local buffer allocations (bsc#1051510).\n- ALSA: sparc: Fix invalid snd_free_pages() at error path (bsc#1051510).\n- ALSA: usb-audio: Add vendor and product name for Dell WD19 Dock (bsc#1051510).\n- ALSA: usb-audio: update quirk for B&W PX to remove microphone (bsc#1051510).\n- ALSA: wss: Fix invalid snd_free_pages() at error path (bsc#1051510).\n- amd/iommu: Fix Guest Virtual APIC Log Tail Address Register (bsc#1106105).\n- arm64: KVM: Move CPU ID reg trap setup off the world switch path (bsc#1110998).\n- arm64: KVM: Sanitize PSTATE.M when being set from userspace (bsc#1110998).\n- arm64: KVM: Tighten guest core register access from userspace (bsc#1110998).\n- ARM: dts: at91: add new compatibility string for macb on sama5d3 (bsc#1051510).\n- ASoC: dwc: Added a quirk DW_I2S_QUIRK_16BIT_IDX_OVERRIDE to dwc (bsc#1085535)\n- ASoC: Intel: cht_bsw_max98090: add support for Baytrail (bsc#1051510).\n- ASoC: intel: cht_bsw_max98090_ti: Add quirk for boards using pmc_plt_clk_0 (bsc#1051510).\n- ASoC: intel: skylake: Add missing break in skl_tplg_get_token() (bsc#1051510).\n- ASoC: Intel: Skylake: Reset the controller in probe (bsc#1051510).\n- ASoC: rsnd: adg: care clock-frequency size (bsc#1051510).\n- ASoC: rsnd: do not fallback to PIO mode when -EPROBE_DEFER (bsc#1051510).\n- ASoC: rt5514: Fix the issue of the delay volume applied again (bsc#1051510).\n- ASoC: sigmadsp: safeload should not have lower byte limit (bsc#1051510).\n- ASoC: sun8i-codec: fix crash on module removal (bsc#1051510).\n- ASoC: wm8804: Add ACPI support (bsc#1051510).\n- ata: Fix racy link clearance (bsc#1107866).\n- ataflop: fix error handling during setup (bsc#1051510).\n- ath10k: fix kernel panic issue during pci probe (bsc#1051510).\n- ath10k: fix scan crash due to incorrect length calculation (bsc#1051510).\n- ath10k: fix use-after-free in ath10k_wmi_cmd_send_nowait (bsc#1051510).\n- ath10k: schedule hardware restart if WMI command times out (bsc#1051510).\n- autofs: fix autofs_sbi() does not check super block type (git-fixes).\n- autofs: fix slab out of bounds read in getname_kernel() (git-fixes).\n- autofs: mount point create should honour passed in mode (git-fixes).\n- badblocks: fix wrong return value in badblocks_set if badblocks are disabled (git-fixes).\n- batman-adv: Avoid probe ELP information leak (bsc#1051510).\n- batman-adv: Expand merged fragment buffer for full packet (bsc#1051510).\n- batman-adv: fix backbone_gw refcount on queue_work() failure (bsc#1051510).\n- batman-adv: fix hardif_neigh refcount on queue_work() failure (bsc#1051510).\n- batman-adv: Use explicit tvlv padding for ELP packets (bsc#1051510).\n- bdi: Fix another oops in wb_workfn() (bsc#1112746).\n- bdi: Preserve kabi when adding cgwb_release_mutex (bsc#1112746).\n- bitops: protect variables in bit_clear_unless() macro (bsc#1051510).\n- bitops: protect variables in set_mask_bits() macro (bsc#1051510).\n- Blacklist commit that modifies Scsi_Host/kabi (bsc#1114579)\n- Blacklist sd_zbc patch that is too invasive (bsc#1114583)\n- Blacklist virtio patch that uses bio_integrity_bytes() (bsc#1114585)\n- blk-mq: I/O and timer unplugs are inverted in blktrace (bsc#1112713).\n- block, bfq: fix wrong init of saved start time for weight raising (bsc#1112708).\n- block: bfq: swap puts in bfqg_and_blkg_put (bsc#1112712).\n- block: copy ioprio in __bio_clone_fast() (bsc#1082653).\n- block: respect virtual boundary mask in bvecs (bsc#1113412).\n- Bluetooth: btbcm: Add entry for BCM4335C0 UART bluetooth (bsc#1051510).\n- Bluetooth: SMP: fix crash in unpairing (bsc#1051510).\n- bnxt_en: Fix TX timeout during netpoll (networking-stable-18_10_16).\n- bnxt_en: free hwrm resources, if driver probe fails (networking-stable-18_10_16).\n- bonding: avoid possible dead-lock (networking-stable-18_10_16).\n- bonding: fix length of actor system (networking-stable-18_11_02).\n- bonding: fix warning message (networking-stable-18_10_16).\n- bonding: pass link-local packets to bonding master also (networking-stable-18_10_16).\n- bpf: fix partial copy of map_ptr when dst is scalar (bsc#1083647).\n- bpf, net: add skb_mac_header_len helper (networking-stable-18_09_24).\n- bpf/verifier: disallow pointer subtraction (bsc#1083647).\n- bpf: wait for running BPF programs when updating map-in-map (bsc#1083647).\n- brcmfmac: fix for proper support of 160MHz bandwidth (bsc#1051510).\n- brcmfmac: fix reporting support for 160 MHz channels (bsc#1051510).\n- brcmutil: really fix decoding channel info for 160 MHz bandwidth (bsc#1051510).\n- bridge: do not add port to router list when receives query with source 0.0.0.0 (networking-stable-18_11_02).\n- Btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667).\n- Btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).\n- Btrfs: fix assertion failure during fsync in no-holes mode (bsc#1118136).\n- Btrfs: fix assertion on fsync of regular file when using no-holes feature (bsc#1118137).\n- Btrfs: fix cur_offset in the error case for nocow (bsc#1118140).\n- Btrfs: fix data corruption due to cloning of eof block (bsc#1116878).\n- Btrfs: fix deadlock on tree root leaf when finding free extent (bsc#1116876).\n- Btrfs: fix deadlock when writing out free space caches (bsc#1116700).\n- Btrfs: fix infinite loop on inode eviction after deduplication of eof block (bsc#1116877).\n- Btrfs: fix missing error return in btrfs_drop_snapshot (Git-fixes bsc#1109919).\n- Btrfs: fix null pointer dereference on compressed write path error (bsc#1116698).\n- Btrfs: fix use-after-free during inode eviction (bsc#1116701).\n- Btrfs: fix use-after-free when dumping free space (bsc#1116862).\n- Btrfs: fix warning when replaying log after fsync of a tmpfile (bsc#1116692).\n- Btrfs: fix wrong dentries after fsync of file that got its parent replaced (bsc#1116693).\n- Btrfs: handle errors while updating refcounts in update_ref_for_cow (Git-fixes bsc#1109915).\n- Btrfs: make sure we create all new block groups (bsc#1116699).\n- Btrfs: protect space cache inode alloc with GFP_NOFS (bsc#1116863).\n- Btrfs: send, fix infinite loop due to directory rename dependencies (bsc#1118138).\n- cachefiles: fix the race between cachefiles_bury_object() and rmdir(2) (bsc#1051510).\n- can: dev: __can_get_echo_skb(): Do not crash the kernel if can_priv::echo_skb is accessed out of bounds (bsc#1051510).\n- can: dev: can_get_echo_skb(): factor out non sending code to __can_get_echo_skb() (bsc#1051510).\n- can: dev: __can_get_echo_skb(): print error message, if trying to echo non existing skb (bsc#1051510).\n- can: dev: __can_get_echo_skb(): replace struct can_frame by canfd_frame to access frame length (bsc#1051510).\n- can: hi311x: Use level-triggered interrupt (bsc#1051510).\n- can: raw: check for CAN FD capable netdev in raw_sendmsg() (bsc#1051510).\n- can: rcar_can: Fix erroneous registration (bsc#1051510).\n- can: rx-offload: introduce can_rx_offload_get_echo_skb() and can_rx_offload_queue_sorted() functions (bsc#1051510).\n- cdc-acm: correct counting of UART states in serial state notification (bsc#1051510).\n- cdc-acm: do not reset notification buffer index upon urb unlinking (bsc#1051510).\n- cdc-acm: fix race between reset and control messaging (bsc#1051510).\n- ceph: avoid a use-after-free in ceph_destroy_options() (bsc#1111983).\n- ceph: fix dentry leak in ceph_readdir_prepopulate (bsc#1114839).\n- ceph: quota: fix null pointer dereference in quota check (bsc#1114839).\n- cfg80211: Address some corner cases in scan result channel updating (bsc#1051510).\n- cfg80211: fix use-after-free in reg_process_hint() (bsc#1051510).\n- cifs: check for STATUS_USER_SESSION_DELETED (bsc#1112902).\n- cifs: fix memory leak in SMB2_open() (bsc#1112894).\n- cifs: Fix use after free of a mid_q_entry (bsc#1112903).\n- clk: at91: Fix division by zero in PLL recalc_rate() (bsc#1051510).\n- clk: fixed-factor: fix of_node_get-put imbalance (bsc#1051510).\n- clk: fixed-rate: fix of_node_get-put imbalance (bsc#1051510).\n- clk: mmp2: fix the clock id for sdh2_clk and sdh3_clk (bsc#1051510).\n- clk: rockchip: Fix static checker warning in rockchip_ddrclk_get_parent call (bsc#1051510).\n- clk: s2mps11: Add used attribute to s2mps11_dt_match (bsc#1051510).\n- clk: s2mps11: Fix matching when built as module and DT node contains compatible (bsc#1051510).\n- clk: samsung: exynos5420: Enable PERIS clocks for suspend (bsc#1051510).\n- clk: x86: add 'ether_clk' alias for Bay Trail / Cherry Trail (bsc#1051510).\n- clk: x86: Stop marking clocks as CLK_IS_CRITICAL (bsc#1051510).\n- clockevents/drivers/i8253: Add support for PIT shutdown quirk (bsc#1051510).\n- clocksource/drivers/ti-32k: Add CLOCK_SOURCE_SUSPEND_NONSTOP flag for non-am43 SoCs (bsc#1051510).\n- clocksource/drivers/timer-atmel-pit: Properly handle error cases (bsc#1051510).\n- coda: fix 'kernel memory exposure attempt' in fsync (bsc#1051510).\n- configfs: replace strncpy with memcpy (bsc#1051510).\n- crypto: caam - fix implicit casts in endianness helpers (bsc#1051510).\n- crypto: chelsio - Fix memory corruption in DMA Mapped buffers (bsc#1051510).\n- crypto: lrw - Fix out-of bounds access on counter overflow (bsc#1051510).\n- crypto: simd - correctly take reqsize of wrapped skcipher into account (bsc#1051510).\n- crypto: tcrypt - fix ghash-generic speed test (bsc#1051510).\n- dax: Fix deadlock in dax_lock_mapping_entry() (bsc#1109951).\n- debugobjects: Make stack check warning more informative (bsc#1051510).\n- Documentation/l1tf: Fix small spelling typo (bsc#1051510).\n- Documentation/l1tf: Fix typos (bsc#1051510).\n- Documentation/l1tf: Remove Yonah processors from not vulnerable list (bsc#1051510).\n- do d_instantiate/unlock_new_inode combinations safely (git-fixes).\n- Do not leak MNT_INTERNAL away from internal mounts (git-fixes).\n- driver/dma/ioat: Call del_timer_sync() without holding prep_lock (bsc#1051510).\n- drm/amdgpu: add missing CHIP_HAINAN in amdgpu_ucode_get_load_type (bsc#1051510).\n- drm/amdgpu: Fix SDMA HQD destroy error on gfx_v7 (bsc#1051510).\n- drm/amdgpu: Fix vce work queue was not cancelled when suspend (bsc#1106110)\n- drm/amdgpu/powerplay: fix missing break in switch statements (bsc#1113722)\n- drm/ast: change resolution may cause screen blurred (boo#1112963).\n- drm/ast: fixed cursor may disappear sometimes (bsc#1051510).\n- drm/ast: Fix incorrect free on ioregs (bsc#1051510).\n- drm/ast: Remove existing framebuffers before loading driver (boo#1112963)\n- drm/dp_mst: Check if primary mstb is null (bsc#1051510).\n- drm/dp_mst: Skip validating ports during destruction, just ref (bsc#1051510).\n- drm/edid: Add 6 bpc quirk for BOE panel (bsc#1051510).\n- drm/edid: Add 6 bpc quirk for BOE panel in HP Pavilion 15-n233sl (bsc#1113722)\n- drm/edid: VSDB yCBCr420 Deep Color mode bit definitions (bsc#1051510).\n- drm: fb-helper: Reject all pixel format changing requests (bsc#1113722)\n- drm/hisilicon: hibmc: Do not carry error code in HiBMC framebuffer (bsc#1113722)\n- drm/hisilicon: hibmc: Do not overwrite fb helper surface depth (bsc#1113722)\n- drm/i915/audio: Hook up component bindings even if displays are (bsc#1113722)\n- drm/i915: Do not oops during modeset shutdown after lpe audio deinit (bsc#1051510).\n- drm/i915: Do not unset intel_connector->mst_port (bsc#1051510).\n- drm/i915/dp: Link train Fallback on eDP only if fallback link BW can fit panel's native mode (bsc#1051510).\n- drm/i915/execlists: Force write serialisation into context image vs execution (bsc#1051510).\n- drm/i915: Fix ilk+ watermarks when disabling pipes (bsc#1051510).\n- drm/i915/gen9+: Fix initial readout for Y tiled framebuffers (bsc#1113722)\n- drm/i915/glk: Add Quirk for GLK NUC HDMI port issues (bsc#1051510).\n- drm/i915/glk: Remove 99% limitation (bsc#1051510).\n- drm/i915/hdmi: Add HDMI 2.0 audio clock recovery N values (bsc#1051510).\n- drm/i915: Large page offsets for pread/pwrite (bsc#1051510).\n- drm/i915: Mark pin flags as u64 (bsc#1051510).\n- drm/i915: Restore vblank interrupts earlier (bsc#1051510).\n- drm/i915: Skip vcpi allocation for MSTB ports that are gone (bsc#1051510).\n- drm/i915: Write GPU relocs harder with gen3 (bsc#1051510).\n- drm: mali-dp: Call drm_crtc_vblank_reset on device init (bsc#1051510).\n- drm/mediatek: fix OF sibling-node lookup (bsc#1106110)\n- drm/meson: add support for 1080p25 mode (bsc#1051510).\n- drm/meson: Enable fast_io in meson_dw_hdmi_regmap_config (bsc#1051510).\n- drm/meson: Fix OOB memory accesses in meson_viu_set_osd_lut() (bsc#1051510).\n- drm/msm: fix OF child-node lookup (bsc#1106110)\n- drm/nouveau: Check backlight IDs are >= 0, not > 0 (bsc#1051510).\n- drm/nouveau: Do not disable polling in fallback mode (bsc#1103356).\n- drm/omap: fix memory barrier bug in DMM driver (bsc#1051510).\n- drm/rockchip: Allow driver to be shutdown on reboot/kexec (bsc#1051510).\n- drm/sti: do not remove the drm_bridge that was never added (bsc#1100132)\n- drm/sun4i: Fix an ulong overflow in the dotclock driver (bsc#1106110)\n- drm/virtio: fix bounds check in virtio_gpu_cmd_get_capset() (bsc#1113722)\n- e1000: check on netif_running() before calling e1000_up() (bsc#1051510).\n- e1000: ensure to free old tx/rx rings in set_ringparam() (bsc#1051510).\n- EDAC, {i7core,sb,skx}_edac: Fix uncorrected error counting (bsc#1114279).\n- EDAC: Raise the maximum number of memory controllers (bsc#1113780).\n- EDAC, skx_edac: Fix logical channel intermediate decoding (bsc#1114279).\n- EDAC, thunderx: Fix memory leak in thunderx_l2c_threaded_isr() (bsc#1114279).\n- eeprom: at24: change nvmem stride to 1 (bsc#1051510).\n- eeprom: at24: check at24_read/write arguments (bsc#1051510).\n- eeprom: at24: correctly set the size for at24mac402 (bsc#1051510).\n- Enable LSPCON instead of blindly disabling HDMI\n- enic: do not call enic_change_mtu in enic_probe (bsc#1051510).\n- enic: handle mtu change for vf properly (bsc#1051510).\n- enic: initialize enic->rfs_h.lock in enic_probe (bsc#1051510).\n- ethtool: fix a privilege escalation bug (bsc#1076830).\n- ext2, dax: set ext2_dax_aops for dax files (bsc#1112554).\n- ext4: add missing brelse() add_new_gdb_meta_bg()'s error path (bsc#1117795).\n- ext4: add missing brelse() in set_flexbg_block_bitmap()'s error path (bsc#1117794).\n- ext4: add missing brelse() update_backups()'s error path (bsc#1117796).\n- ext4: avoid arithemetic overflow that can trigger a BUG (bsc#1112736).\n- ext4: avoid buffer leak in ext4_orphan_add() after prior errors (bsc#1117802).\n- ext4: avoid buffer leak on shutdown in ext4_mark_iloc_dirty() (bsc#1117801).\n- ext4: avoid divide by zero fault when deleting corrupted inline directories (bsc#1112735).\n- ext4: avoid potential extra brelse in setup_new_flex_group_blocks() (bsc#1117792).\n- ext4: check for NUL characters in extended attribute's name (bsc#1112732).\n- ext4: check to make sure the rename(2)'s destination is not freed (bsc#1112734).\n- ext4: do not mark mmp buffer head dirty (bsc#1112743).\n- ext4: fix buffer leak in __ext4_read_dirblock() on error path (bsc#1117807).\n- ext4: fix buffer leak in ext4_xattr_move_to_block() on error path (bsc#1117806).\n- ext4: fix missing cleanup if ext4_alloc_flex_bg_array() fails while resizing (bsc#1117798).\n- ext4: fix online resize's handling of a too-small final block group (bsc#1112739).\n- ext4: fix online resizing for bigalloc file systems with a 1k block size (bsc#1112740).\n- ext4: fix possible inode leak in the retry loop of ext4_resize_fs() (bsc#1117799).\n- ext4: fix possible leak of sbi->s_group_desc_leak in error path (bsc#1117803).\n- ext4: fix possible leak of s_journal_flag_rwsem in error path (bsc#1117804).\n- ext4: fix setattr project check in fssetxattr ioctl (bsc#1117789).\n- ext4: fix spectre gadget in ext4_mb_regular_allocator() (bsc#1112733).\n- ext4: fix use-after-free race in ext4_remount()'s error path (bsc#1117791).\n- ext4: initialize retries variable in ext4_da_write_inline_data_begin() (bsc#1117788).\n- ext4: propagate error from dquot_initialize() in EXT4_IOC_FSSETXATTR (bsc#1117790).\n- ext4: recalucate superblock checksum after updating free blocks/inodes (bsc#1112738).\n- ext4: release bs.bh before re-using in ext4_xattr_block_find() (bsc#1117805).\n- ext4: reset error code in ext4_find_entry in fallback (bsc#1112731).\n- ext4: show test_dummy_encryption mount option in /proc/mounts (bsc#1112741).\n- fbdev: fix broken menu dependencies (bsc#1113722)\n- fbdev/omapfb: fix omapfb_memory_read infoleak (bsc#1051510).\n- firmware: dcdbas: Add support for WSMT ACPI table (bsc#1089350 ).\n- firmware: dcdbas: include linux/io.h (bsc#1089350).\n- Fix kABI for 'Ensure we commit after writeback is complete' (bsc#1111809).\n- floppy: fix race condition in __floppy_read_block_0() (bsc#1051510).\n- flow_dissector: do not dissect l4 ports for fragments (networking-stable-18_11_21).\n- fscache: fix race between enablement and dropping of object (bsc#1107385).\n- fs: dcache: Avoid livelock between d_alloc_parallel and __d_add (git-fixes).\n- fs/dcache.c: fix kmemcheck splat at take_dentry_name_snapshot() (git-fixes).\n- fs: dcache: Use READ_ONCE when accessing i_dir_seq (git-fixes).\n- fs: Make extension of struct super_block transparent (bsc#1117822).\n- fsnotify: Fix busy inodes during unmount (bsc#1117822).\n- fsnotify: fix ignore mask logic in fsnotify() (bsc#1115074).\n- fs/quota: Fix spectre gadget in do_quotactl (bsc#1112745).\n- ftrace: Fix debug preempt config name in stack_tracer_{en,dis}able (bsc#1117172).\n- ftrace: Fix kmemleak in unregister_ftrace_graph (bsc#1117181).\n- ftrace: Fix memleak when unregistering dynamic ops when tracing disabled (bsc#1117174).\n- ftrace: Remove incorrect setting of glob search field (bsc#1117184).\n- genirq: Fix race on spurious interrupt detection (bsc#1051510).\n- getname_kernel() needs to make sure that ->name != ->iname in long case (git-fixes).\n- gpio: do not free unallocated ida on gpiochip_add_data_with_key() error path (bsc#1051510).\n- grace: replace BUG_ON by WARN_ONCE in exit_net hook (git-fixes).\n- gso_segment: Reset skb->mac_len after modifying network header (networking-stable-18_09_24).\n- hfsplus: do not return 0 when fill_super() failed (bsc#1051510).\n- hfsplus: stop workqueue when fill_super() failed (bsc#1051510).\n- hfs: prevent crash on exit from failed search (bsc#1051510).\n- HID: hiddev: fix potential Spectre v1 (bsc#1051510).\n- HID: hid-sensor-hub: Force logical minimum to 1 for power and report state (bsc#1051510).\n- HID: quirks: fix support for Apple Magic Keyboards (bsc#1051510).\n- HID: sensor-hub: Restore fixup for Lenovo ThinkPad Helix 2 sensor hub report (bsc#1051510).\n- HID: uhid: forbid UHID_CREATE under KERNEL_DS or elevated privileges (bsc#1051510).\n- hv: avoid crash in vmbus sysfs files (bnc#1108377).\n- hv_netvsc: fix schedule in RCU context ().\n- hv_netvsc: ignore devices that are not PCI (networking-stable-18_09_11).\n- hwmon: (core) Fix double-free in __hwmon_device_register() (bsc#1051510).\n- hwmon: (ibmpowernv) Remove bogus __init annotations (bsc#1051510).\n- hwmon: (ina2xx) Fix current value calculation (bsc#1051510).\n- hwmon (ina2xx) Fix NULL id pointer in probe() (bsc#1051510).\n- hwmon: (nct6775) Fix potential Spectre v1 (bsc#1051510).\n- hwmon: (pmbus) Fix page count auto-detection (bsc#1051510).\n- hwmon: (pwm-fan) Set fan speed to 0 on suspend (bsc#1051510).\n- hwmon: (raspberrypi) Fix initial notify (bsc#1051510).\n- hwmon: (w83795) temp4_type has writable permission (bsc#1051510).\n- hwrng: core - document the quality field (bsc#1051510).\n- hypfs_kill_super(): deal with failed allocations (bsc#1051510).\n- i2c: i2c-scmi: fix for i2c_smbus_write_block_data (bsc#1051510).\n- i2c: rcar: cleanup DMA for all kinds of failure (bsc#1051510).\n- ibmvnic: fix accelerated VLAN handling ().\n- ibmvnic: fix index in release_rx_pools (bsc#1115440, bsc#1115433).\n- ibmvnic: remove ndo_poll_controller ().\n- ibmvnic: Update driver queues after change in ring size support ().\n- iio: accel: adxl345: convert address field usage in iio_chan_spec (bsc#1051510).\n- iio: ad5064: Fix regulator handling (bsc#1051510).\n- iio: adc: at91: fix acking DRDY irq on simple conversions (bsc#1051510).\n- iio: adc: at91: fix wrong channel number in triggered buffer mode (bsc#1051510).\n- iio: adc: imx25-gcq: Fix leak of device_node in mx25_gcq_setup_cfgs() (bsc#1051510).\n- iio:st_magn: Fix enable device after trigger (bsc#1051510).\n- ima: fix showing large 'violations' or 'runtime_measurements_count' (bsc#1051510).\n- include/linux/pfn_t.h: force '~' to be parsed as an unary operator (bsc#1051510).\n- inet: make sure to grab rcu_read_lock before using ireq->ireq_opt (networking-stable-18_10_16).\n- Input: atakbd - fix Atari CapsLock behaviour (bsc#1051510).\n- Input: atakbd - fix Atari keymap (bsc#1051510).\n- Input: elan_i2c - add ACPI ID for Lenovo IdeaPad 330-15IGM (bsc#1051510).\n- Input: synaptics - avoid using uninitialized variable when probing (bsc#1051510).\n- Input: xpad - add PDP device id 0x02a4 (bsc#1051510).\n- Input: xpad - add support for Xbox1 PDP Camo series gamepad (bsc#1051510).\n- Input: xpad - avoid using __set_bit() for capabilities (bsc#1051510).\n- Input: xpad - fix some coding style issues (bsc#1051510).\n- intel_th: pci: Add Ice Lake PCH support (bsc#1051510).\n- iommu/arm-smmu: Ensure that page-table updates are visible before TLBI (bsc#1106237).\n- iommu/arm-smmu: Error out only if not enough context interrupts (bsc#1106237).\n- iommu/ipmmu-vmsa: Fix crash on early domain free (bsc#1106105).\n- iommu/vt-d: Add definitions for PFSID (bsc#1106237).\n- iommu/vt-d: Fix dev iotlb pfsid use (bsc#1106237).\n- iommu/vt-d: Fix NULL pointer dereference in prq_event_thread() (bsc#1106105).\n- iommu/vt-d: Fix scatterlist offset handling (bsc#1106237).\n- iommu/vt-d: Use memunmap to free memremap (bsc#1106105).\n- ip6_tunnel: be careful when accessing the inner header (networking-stable-18_10_16).\n- ip6_tunnel: Fix encapsulation layout (networking-stable-18_11_02).\n- ip6_vti: fix a null pointer deference when destroy vti6 tunnel (networking-stable-18_09_11).\n- ipmi: Fix timer race with module unload (bsc#1051510).\n- ip_tunnel: be careful when accessing the inner header (networking-stable-18_10_16).\n- ip_tunnel: do not force DF when MTU is locked (networking-stable-18_11_21).\n- ipv4: lock mtu in fnhe when received PMTU < net.ipv4.route.min_pmtu (networking-stable-18_11_21).\n- ipv4: tcp: send zero IPID for RST and ACK sent in SYN-RECV and TIME-WAIT state (networking-stable-18_09_11).\n- ipv6: Fix PMTU updates for UDP/raw sockets in presence of VRF (networking-stable-18_11_21).\n- ipv6: fix possible use-after-free in ip6_xmit() (networking-stable-18_09_24).\n- ipv6: mcast: fix a use-after-free in inet6_mc_check (networking-stable-18_11_02).\n- ipv6/ndisc: Preserve IPv6 control buffer if protocol error handlers are called (networking-stable-18_11_02).\n- ipv6: take rcu lock in rawv6_send_hdrinc() (networking-stable-18_10_16).\n- iwlwifi: dbg: allow wrt collection before ALIVE (bsc#1051510).\n- iwlwifi: dbg: do not crash if the firmware crashes in the middle of a debug dump (bsc#1051510).\n- iwlwifi: do not WARN on trying to dump dead firmware (bsc#1051510).\n- iwlwifi: mvm: Allow TKIP for AP mode (bsc#1051510).\n- iwlwifi: mvm: check for n_profiles validity in EWRD ACPI (bsc#1051510).\n- iwlwifi: mvm: check for short GI only for OFDM (bsc#1051510).\n- iwlwifi: mvm: check return value of rs_rate_from_ucode_rate() (bsc#1051510).\n- iwlwifi: mvm: clear HW_RESTART_REQUESTED when stopping the interface (bsc#1051510).\n- iwlwifi: mvm: do not use SAR Geo if basic SAR is not used (bsc#1051510).\n- iwlwifi: mvm: fix BAR seq ctrl reporting (bsc#1051510).\n- iwlwifi: mvm: fix regulatory domain update when the firmware starts (bsc#1051510).\n- iwlwifi: mvm: open BA session only when sta is authorized (bsc#1051510).\n- iwlwifi: mvm: send BCAST management frames to the right station (bsc#1051510).\n- iwlwifi: mvm: support sta_statistics() even on older firmware (bsc#1051510).\n- iwlwifi: pcie: avoid empty free RB queue (bsc#1051510).\n- iwlwifi: pcie: gen2: build A-MSDU only for GSO (bsc#1051510).\n- iwlwifi: pcie gen2: check iwl_pcie_gen2_set_tb() return value (bsc#1051510).\n- jbd2: fix use after free in jbd2_log_do_checkpoint() (bsc#1113257).\n- KABI fix for 'NFSv4.1: Fix up replays of interrupted requests' (git-fixes).\n- kABI: Hide get_msr_feature() in kvm_x86_ops (bsc#1106240).\n- KABI: hide new member in struct iommu_table from genksyms (bsc#1061840).\n- KABI: mask raw in struct bpf_reg_state (bsc#1083647).\n- KABI: powerpc: export __find_linux_pte as __find_linux_pte_or_hugepte (bsc#1061840).\n- KABI: powerpc: Revert npu callback signature change (bsc#1055120).\n- KABI: protect struct fib_nh_exception (kabi).\n- KABI: protect struct rtable (kabi).\n- KABI/severities: ignore __xive_vm_h_* KVM internal symbols.\n- Kbuild: fix # escaping in .cmd files for future Make (git-fixes).\n- kbuild: fix kernel/bounds.c 'W=1' warning (bsc#1051510).\n- kbuild: move '_all' target out of $(KBUILD_SRC) conditional (bsc#1114279).\n- kernfs: update comment about kernfs_path() return value (bsc#1051510).\n- kgdboc: Passing ekgdboc to command line causes panic (bsc#1051510).\n- kprobes/x86: Fix %p uses in error messages (bsc#1110006).\n- KVM: arm/arm64: Introduce vcpu_el1_is_32bit (bsc#1110998).\n- KVM: Make VM ioctl do valloc for some archs (bsc#1111506).\n- KVM: nVMX: Always reflect #NM VM-exits to L1 (bsc#1106240).\n- KVM: nVMX: move check_vmentry_postreqs() call to nested_vmx_enter_non_root_mode() (bsc#1106240).\n- KVM: PPC: Add pt_regs into kvm_vcpu_arch and move vcpu->arch.gpr[] into it (bsc#1061840).\n- KVM: PPC: Avoid marking DMA-mapped pages dirty in real mode (bsc#1061840).\n- KVM: PPC: Book3S: Add MMIO emulation for VMX instructions (bsc#1061840).\n- KVM: PPC: Book3S: Allow backing bigger guest IOMMU pages with smaller physical pages (bsc#1061840).\n- KVM: PPC: Book3S: Check KVM_CREATE_SPAPR_TCE_64 parameters (bsc#1061840).\n- KVM: PPC: Book3S: Eliminate some unnecessary checks (bsc#1061840).\n- KVM: PPC: Book3S: Fix compile error that occurs with some gcc versions (bsc#1061840).\n- KVM: PPC: Book3S: Fix matching of hardware and emulated TCE tables (bsc#1061840).\n- KVM: PPC: Book3S HV: Add of_node_put() in success path (bsc#1061840).\n- KVM: PPC: Book3S HV: Add 'online' register to ONE_REG interface (bsc#1061840).\n- KVM: PPC: Book3S HV: Allow creating max number of VCPUs on POWER9 (bsc#1061840).\n- KVM: PPC: Book3S HV: Allow HPT and radix on the same core for POWER9 v2.2 (bsc#1061840).\n- KVM: PPC: Book3S HV: Avoid crash from THP collapse during radix page fault (bsc#1061840).\n- KVM: PPC: Book3S HV: Avoid shifts by negative amounts (bsc#1061840).\n- KVM: PPC: Book3S HV: Check DR not IR to chose real vs virt mode MMIOs (bsc#1061840).\n- KVM: PPC: Book3S HV: Do not truncate HPTE index in xlate function (bsc#1061840).\n- KVM: PPC: Book3S HV: Do not use compound_order to determine host mapping size (bsc#1061840).\n- KVM: PPC: Book3S HV: Do not use existing 'prodded' flag for XIVE escalations (bsc#1061840).\n- KVM: PPC: Book 3S HV: Do ptesync in radix guest exit path (bsc#1061840).\n- KVM: PPC: Book3S HV: Do SLB load/unload with guest LPCR value loaded (bsc#1061840).\n- KVM: PPC: Book3S HV: Enable migration of decrementer register (bsc#1061840).\n- KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix conditions for starting vcpu (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix constant size warning (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix duplication of host SLB entries (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix guest r11 corruption with POWER9 TM workarounds (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix handling of large pages in radix page fault handler (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix handling of secondary HPTEG in HPT resizing code (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix inaccurate comment (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix kvmppc_bad_host_intr for real mode interrupts (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix trap number return from __kvmppc_vcore_entry (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix typo in kvmppc_hv_get_dirty_log_radix() (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix VRMA initialization with 2MB or 1GB memory backing (bsc#1061840).\n- KVM: PPC: Book3S HV: Handle 1GB pages in radix page fault handler (bsc#1061840).\n- KVM: PPC: Book3S HV: Improve handling of debug-trigger HMIs on POWER9 (bsc#1061840).\n- KVM: PPC: Book3S HV: Keep XIVE escalation interrupt masked unless ceded (bsc#1061840).\n- KVM: PPC: Book3S HV: Lockless tlbie for HPT hcalls (bsc#1061840).\n- KVM: PPC: Book3S HV: Make HPT resizing work on POWER9 (bsc#1061840).\n- KVM: PPC: Book3S HV: Make radix clear pte when unmapping (bsc#1061840).\n- KVM: PPC: Book3S HV: Make radix use correct tlbie sequence in kvmppc_radix_tlbie_page (bsc#1061840).\n- KVM: PPC: Book3S HV: Make xive_pushed a byte, not a word (bsc#1061840).\n- KVM: PPC: Book3S HV: Pack VCORE IDs to access full VCPU ID space (bsc#1061840).\n- KVM: PPC: Book3S HV: radix: Do not clear partition PTE when RC or write bits do not match (bsc#1061840).\n- KVM: PPC: Book3S HV: Radix page fault handler optimizations (bsc#1061840).\n- KVM: PPC: Book3S HV: radix: Refine IO region partition scope attributes (bsc#1061840).\n- KVM: PPC: Book3S HV: Read kvm->arch.emul_smt_mode under kvm->lock (bsc#1061840).\n- KVM: PPC: Book3S HV: Recursively unmap all page table entries when unmapping (bsc#1061840).\n- KVM: PPC: Book3S HV: Remove useless statement (bsc#1061840).\n- KVM: PPC: Book3S HV: Remove vcpu->arch.dec usage (bsc#1061840).\n- KVM: PPC: Book3S HV: Send kvmppc_bad_interrupt NMIs to Linux handlers (bsc#1061840).\n- KVM: PPC: Book3S HV: Set RWMR on POWER8 so PURR/SPURR count correctly (bsc#1061840).\n- KVM: PPC: Book3S HV: Snapshot timebase offset on guest entry (bsc#1061840).\n- KVM: PPC: Book3S HV: Streamline setting of reference and change bits (bsc#1061840).\n- KVM: PPC: Book3S HV: Use a helper to unmap ptes in the radix fault path (bsc#1061840).\n- KVM: PPC: Book3S HV: Use __gfn_to_pfn_memslot() in page fault handler (bsc#1061840).\n- KVM: PPC: Book3S HV: XIVE: Resend re-routed interrupts on CPU priority change (bsc#1061840).\n- KVM: PPC: Book3S PR: Add guest MSR parameter for kvmppc_save_tm()/kvmppc_restore_tm() (bsc#1061840).\n- KVM: PPC: Book3S PR: Move kvmppc_save_tm/kvmppc_restore_tm to separate file (bsc#1061840).\n- KVM: PPC: Book3S: Use correct page shift in H_STUFF_TCE (bsc#1061840).\n- KVM: PPC: Fix a mmio_host_swabbed uninitialized usage issue (bsc#1061840).\n- KVM: PPC: Make iommu_table::it_userspace big endian (bsc#1061840).\n- KVM: PPC: Move nip/ctr/lr/xer registers to pt_regs in kvm_vcpu_arch (bsc#1061840).\n- KVM: PPC: Use seq_puts() in kvmppc_exit_timing_show() (bsc#1061840).\n- KVM: s390: vsie: copy wrapping keys to right place (git-fixes).\n- KVM: SVM: Add MSR-based feature support for serializing LFENCE (bsc#1106240).\n- KVM: svm: Ensure an IBPB on all affected CPUs when freeing a vmcb (bsc#1114279).\n- KVM: VMX: re-add ple_gap module parameter (bsc#1106240).\n- KVM: VMX: support MSR_IA32_ARCH_CAPABILITIES as a feature MSR (bsc#1106240).\n- KVM: VMX: Tell the nested hypervisor to skip L1D flush on vmentry (bsc#1106240).\n- KVM: x86: Add a framework for supporting MSR-based features (bsc#1106240).\n- KVM: x86: define SVM/VMX specific kvm_arch_[alloc|free]_vm (bsc#1111506).\n- KVM: x86: Fix kernel info-leak in KVM_HC_CLOCK_PAIRING hypercall (bsc#1106240).\n- KVM: X86: Introduce kvm_get_msr_feature() (bsc#1106240).\n- KVM/x86: kABI fix for vm_alloc/vm_free changes (bsc#1111506).\n- KVM: x86: Set highest physical address bits in non-present/reserved SPTEs (bsc#1106240).\n- libceph: bump CEPH_MSG_MAX_DATA_LEN (bsc#1114839).\n- libceph: fall back to sendmsg for slab pages (bsc#1118316).\n- libertas: call into generic suspend code before turning off power (bsc#1051510).\n- libertas: do not set URB_ZERO_PACKET on IN USB transfer (bsc#1051510).\n- libnvdimm, badrange: remove a WARN for list_empty (bsc#1112128).\n- libnvdimm, dimm: Maximize label transfer size (bsc#1111921, bsc#1113408, bsc#1113972).\n- libnvdimm: Hold reference on parent while scheduling async init (bsc#1116891).\n- libnvdimm: Introduce locked DIMM capacity support (bsc#1112128).\n- libnvdimm, label: change nvdimm_num_label_slots per UEFI 2.7 (bsc#1111921, bsc#1113408, bsc#1113972).\n- libnvdimm, label: Fix sparse warning (bsc#1111921, bsc#1113408, bsc#1113972).\n- libnvdimm: move poison list functions to a new 'badrange' file (bsc#1112128).\n- libnvdimm/nfit_test: add firmware download emulation (bsc#1112128).\n- libnvdimm/nfit_test: adding support for unit testing enable LSS status (bsc#1112128).\n- libnvdimm, region: Fail badblocks listing for inactive regions (bsc#1116899).\n- libnvdimm, testing: Add emulation for smart injection commands (bsc#1112128).\n- libnvdimm, testing: update the default smart ctrl_temperature (bsc#1112128).\n- lib/ubsan: add type mismatch handler for new GCC/Clang (bsc#1051510).\n- lib/ubsan.c: s/missaligned/misaligned/ (bsc#1051510).\n- livepatch: create and include UAPI headers ().\n- llc: set SOCK_RCU_FREE in llc_sap_add_socket() (networking-stable-18_11_02).\n- lockd: fix 'list_add double add' caused by legacy signal interface (git-fixes).\n- loop: add recursion validation to LOOP_CHANGE_FD (bsc#1112711).\n- loop: do not call into filesystem while holding lo_ctl_mutex (bsc#1112710).\n- loop: fix LOOP_GET_STATUS lock imbalance (bsc#1113284).\n- mac80211: Always report TX status (bsc#1051510).\n- mac80211: fix TX status reporting for ieee80211s (bsc#1051510).\n- mac80211_hwsim: do not omit multicast announce of first added radio (bsc#1051510).\n- mac80211: minstrel: fix using short preamble CCK rates on HT clients (bsc#1051510).\n- mac80211: TDLS: fix skb queue/priority assignment (bsc#1051510).\n- mach64: detect the dot clock divider correctly on sparc (bsc#1051510).\n- mach64: fix display corruption on big endian machines (bsc#1113722)\n- mach64: fix image corruption due to reading accelerator registers (bsc#1113722)\n- mailbox: PCC: handle parse error (bsc#1051510).\n- make sure that __dentry_kill() always invalidates d_seq, unhashed or not (git-fixes).\n- md: allow metadata updates while suspending an array - fix (git-fixes).\n- MD: fix invalid stored role for a disk - try2 (git-fixes).\n- md: fix NULL dereference of mddev->pers in remove_and_add_spares() (git-fixes).\n- md/raid10: fix that replacement cannot complete recovery after reassemble (git-fixes).\n- md/raid1: add error handling of read error from FailFast device (git-fixes).\n- md/raid5-cache: disable reshape completely (git-fixes).\n- md/raid5: fix data corruption of replacements after originals dropped (git-fixes).\n- media: af9035: prevent buffer overflow on write (bsc#1051510).\n- media: cx231xx: fix potential sign-extension overflow on large shift (bsc#1051510).\n- media: dvb: fix compat ioctl translation (bsc#1051510).\n- media: em28xx: fix input name for Terratec AV 350 (bsc#1051510).\n- media: em28xx: use a default format if TRY_FMT fails (bsc#1051510).\n- media: pci: cx23885: handle adding to list failure (bsc#1051510).\n- media: tvp5150: avoid going past array on v4l2_querymenu() (bsc#1051510).\n- media: tvp5150: fix switch exit in set control handler (bsc#1051510).\n- media: tvp5150: fix width alignment during set_selection() (bsc#1051510).\n- media: uvcvideo: Fix uvc_alloc_entity() allocation alignment (bsc#1051510).\n- media: v4l2-tpg: fix kernel oops when enabling HFLIP and OSD (bsc#1051510).\n- media: vsp1: Fix YCbCr planar formats pitch calculation (bsc#1051510).\n- memory_hotplug: cond_resched in __remove_pages (bnc#1114178).\n- mfd: arizona: Correct calling of runtime_put_sync (bsc#1051510).\n- mfd: menelaus: Fix possible race condition and leak (bsc#1051510).\n- mfd: omap-usb-host: Fix dts probe of children (bsc#1051510).\n- mlxsw: spectrum: Fix IP2ME CPU policer configuration (networking-stable-18_11_21).\n- mmc: block: avoid multiblock reads for the last sector in SPI mode (bsc#1051510).\n- mmc: dw_mmc-rockchip: correct property names in debug (bsc#1051510).\n- mmc: sdhci-pci-o2micro: Add quirk for O2 Micro dev 0x8620 rev 0x01 (bsc#1051510).\n- mm: handle no memcg case in memcg_kmem_charge() properly (bnc#1113677).\n- mm/migrate: Use spin_trylock() while resetting rate limit ().\n- mm: /proc/pid/pagemap: hide swap entries from unprivileged users (Git-fixes bsc#1109907).\n- mm: rework memcg kernel stack accounting (bnc#1113677).\n- modpost: ignore livepatch unresolved relocations ().\n- mount: Do not allow copying MNT_UNBINDABLE|MNT_LOCKED mounts (bsc#1117819).\n- mount: Prevent MNT_DETACH from disconnecting locked mounts (bsc#1117820).\n- mount: Retest MNT_LOCKED in do_umount (bsc#1117818).\n- move changes without Git-commit out of sorted section\n- neighbour: confirm neigh entries when ARP packet is received (networking-stable-18_09_24).\n- net/af_iucv: drop inbound packets with invalid flags (bnc#1113501, LTC#172679).\n- net/af_iucv: fix skb handling on HiperTransport xmit error (bnc#1113501, LTC#172679).\n- net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT (networking-stable-18_09_24).\n- net: aquantia: memory corruption on jumbo frames (networking-stable-18_10_16).\n- net: bcmgenet: Poll internal PHY for GENETv5 (networking-stable-18_11_02).\n- net: bcmgenet: protect stop from timeout (networking-stable-18_11_21).\n- net: bcmgenet: use MAC link status for fixed phy (networking-stable-18_09_11).\n- net: bridge: remove ipv6 zero address check in mcast queries (git-fixes).\n- net: dsa: bcm_sf2: Call setup during switch resume (networking-stable-18_10_16).\n- net: dsa: bcm_sf2: Fix unbind ordering (networking-stable-18_10_16).\n- net: ena: add functions for handling Low Latency Queues in ena_com (bsc#1111696 bsc#1117561).\n- net: ena: add functions for handling Low Latency Queues in ena_netdev (bsc#1111696 bsc#1117561).\n- net: ena: change rx copybreak default to reduce kernel memory pressure (bsc#1111696 bsc#1117561).\n- net: ena: complete host info to match latest ENA spec (bsc#1111696 bsc#1117561).\n- net: ena: enable Low Latency Queues (bsc#1111696 bsc#1117561).\n- net: ena: explicit casting and initialization, and clearer error handling (bsc#1111696 bsc#1117561).\n- net: ena: fix auto casting to boolean (bsc#1111696 bsc#1117561).\n- net: ena: fix compilation error in xtensa architecture (bsc#1111696 bsc#1117561).\n- net: ena: fix crash during failed resume from hibernation (bsc#1111696 bsc#1117561).\n- net: ena: fix indentations in ena_defs for better readability (bsc#1111696 bsc#1117561).\n- net: ena: Fix Kconfig dependency on X86 (bsc#1111696 bsc#1117561).\n- net: ena: fix NULL dereference due to untimely napi initialization (bsc#1111696 bsc#1117561).\n- net: ena: fix rare bug when failed restart/resume is followed by driver removal (bsc#1111696 bsc#1117561).\n- net: ena: fix warning in rmmod caused by double iounmap (bsc#1111696 bsc#1117561).\n- net: ena: introduce Low Latency Queues data structures according to ENA spec (bsc#1111696 bsc#1117561).\n- net: ena: limit refill Rx threshold to 256 to avoid latency issues (bsc#1111696 bsc#1117561).\n- net: ena: minor performance improvement (bsc#1111696 bsc#1117561).\n- net: ena: remove ndo_poll_controller (bsc#1111696 bsc#1117561).\n- net: ena: remove redundant parameter in ena_com_admin_init() (bsc#1111696 bsc#1117561).\n- net: ena: update driver version to 2.0.1 (bsc#1111696 bsc#1117561).\n- net: ena: use CSUM_CHECKED device indication to report skb's checksum status (bsc#1111696 bsc#1117561).\n- net: fec: do not dump RX FIFO register when not available (networking-stable-18_11_02).\n- net-gro: reset skb->pkt_type in napi_reuse_skb() (networking-stable-18_11_21).\n- net: hns: fix for unmapping problem when SMMU is on (networking-stable-18_10_16).\n- net: hp100: fix always-true check for link up state (networking-stable-18_09_24).\n- net: ibm: fix return type of ndo_start_xmit function ().\n- net/ibmnvic: Fix deadlock problem in reset ().\n- net/ibmvnic: Fix RTNL deadlock during device reset (bnc#1115431).\n- net: ipmr: fix unresolved entry dumps (networking-stable-18_11_02).\n- net: ipv4: do not let PMTU updates increase route MTU (git-fixes).\n- net/ipv6: Display all addresses in output of /proc/net/if_inet6 (networking-stable-18_10_16).\n- net/ipv6: Fix index counter for unicast addresses in in6_dump_addrs (networking-stable-18_11_02).\n- netlabel: check for IPV4MASK in addrinfo_get (networking-stable-18_10_16).\n- net: macb: do not disable MDIO bus at open/close time (networking-stable-18_09_11).\n- net/mlx5: Check for error in mlx5_attach_interface (networking-stable-18_09_18).\n- net/mlx5e: Fix selftest for small MTUs (networking-stable-18_11_21).\n- net/mlx5e: Set vlan masks for all offloaded TC rules (networking-stable-18_10_16).\n- net/mlx5: E-Switch, Fix memory leak when creating switchdev mode FDB tables (networking-stable-18_09_18).\n- net/mlx5: E-Switch, Fix out of bound access when setting vport rate (networking-stable-18_10_16).\n- net/mlx5: Fix debugfs cleanup in the device init/remove flow (networking-stable-18_09_18).\n- net/mlx5: Fix use-after-free in self-healing flow (networking-stable-18_09_18).\n- net/mlx5: Take only bit 24-26 of wqe.pftype_wq for page fault type (networking-stable-18_11_02).\n- net: mvpp2: Extract the correct ethtype from the skb for tx csum offload (networking-stable-18_10_16).\n- net: mvpp2: fix a txq_done race condition (networking-stable-18_10_16).\n- net/packet: fix packet drop as of virtio gso (networking-stable-18_10_16).\n- net: phy: mdio-gpio: Fix working over slow can_sleep GPIOs (networking-stable-18_11_21).\n- net: qca_spi: Fix race condition in spi transfers (networking-stable-18_09_18).\n- net: qmi_wwan: add Wistron Neweb D19Q1 (bsc#1051510).\n- net: sched: action_ife: take reference to meta module (networking-stable-18_09_11).\n- net/sched: act_pedit: fix dump of extended layered op (networking-stable-18_09_11).\n- net/sched: act_sample: fix NULL dereference in the data path (networking-stable-18_09_24).\n- net: sched: Fix for duplicate class dump (networking-stable-18_11_02).\n- net: sched: Fix memory exposure from short TCA_U32_SEL (networking-stable-18_09_11).\n- net: sched: gred: pass the right attribute to gred_change_table_def() (networking-stable-18_11_02).\n- net: smsc95xx: Fix MTU range (networking-stable-18_11_21).\n- net: socket: fix a missing-check bug (networking-stable-18_11_02).\n- net: stmmac: Fix stmmac_mdio_reset() when building stmmac as modules (networking-stable-18_11_02).\n- net: stmmac: Fixup the tail addr setting in xmit path (networking-stable-18_10_16).\n- net: systemport: Fix wake-up interrupt race during resume (networking-stable-18_10_16).\n- net: systemport: Protect stop from timeout (networking-stable-18_11_21).\n- net: udp: fix handling of CHECKSUM_COMPLETE packets (networking-stable-18_11_02).\n- net/usb: cancel pending work when unbinding smsc75xx (networking-stable-18_10_16).\n- NFC: nfcmrvl_uart: fix OF child-node lookup (bsc#1051510).\n- nfit_test: add error injection DSMs (bsc#1112128).\n- nfit_test: fix buffer overrun, add sanity check (bsc#1112128).\n- nfit_test: improve structure offset handling (bsc#1112128).\n- nfit_test: prevent parsing error of nfit_test.0 (bsc#1112128).\n- nfit_test: when clearing poison, also remove badrange entries (bsc#1112128).\n- nfp: wait for posted reconfigs when disabling the device (networking-stable-18_09_11).\n- NFS: Avoid quadratic search when freeing delegations (bsc#1084760).\n- NFS: Avoid RCU usage in tracepoints (git-fixes).\n- NFS: commit direct writes even if they fail partially (git-fixes).\n- nfsd4: permit layoutget of executable-only files (git-fixes).\n- nfsd: check for use of the closed special stateid (git-fixes).\n- nfsd: CLOSE SHOULD return the invalid special stateid for NFSv4.x (x>0) (git-fixes).\n- nfsd: deal with revoked delegations appropriately (git-fixes).\n- nfsd: Ensure we check stateid validity in the seqid operation checks (git-fixes).\n- nfsd: Fix another OPEN stateid race (git-fixes).\n- nfsd: fix corrupted reply to badly ordered compound (git-fixes).\n- nfsd: fix potential use-after-free in nfsd4_decode_getdeviceinfo (git-fixes).\n- nfsd: Fix stateid races between OPEN and CLOSE (git-fixes).\n- NFS: do not wait on commit in nfs_commit_inode() if there were no commit requests (git-fixes).\n- nfsd: restrict rd_maxcount to svc_max_payload in nfsd_encode_readdir (git-fixes).\n- NFS: Ensure we commit after writeback is complete (bsc#1111809).\n- NFS: Fix an incorrect type in struct nfs_direct_req (git-fixes).\n- NFS: Fix a typo in nfs_rename() (git-fixes).\n- NFS: Fix typo in nomigration mount option (git-fixes).\n- NFS: Fix unstable write completion (git-fixes).\n- NFSv4.0 fix client reference leak in callback (git-fixes).\n- NFSv4.1: Fix a potential layoutget/layoutrecall deadlock (git-fixes).\n- NFSv4.1 fix infinite loop on I/O (git-fixes).\n- NFSv4.1: Fix the client behaviour on NFS4ERR_SEQ_FALSE_RETRY (git-fixes).\n- NFSv4.1: Fix up replays of interrupted requests (git-fixes).\n- NFSv4: Fix a typo in nfs41_sequence_process (git-fixes).\n- nl80211: Fix possible Spectre-v1 for CQM RSSI thresholds (bsc#1051510).\n- nl80211: Fix possible Spectre-v1 for NL80211_TXRATE_HT (bsc#1051510).\n- nospec: Include <asm/barrier.h> dependency (bsc#1114279).\n- nvdimm: Clarify comment in sizeof_namespace_index (bsc#1111921, bsc#1113408, bsc#1113972).\n- nvdimm: Remove empty if statement (bsc#1111921, bsc#1113408, bsc#1113972).\n- nvdimm: Sanity check labeloff (bsc#1111921, bsc#1113408, bsc#1113972).\n- nvdimm: Split label init out from the logic for getting config data (bsc#1111921, bsc#1113408, bsc#1113972).\n- nvdimm: Use namespace index data to reduce number of label reads needed (bsc#1111921, bsc#1113408, bsc#1113972).\n- nvme: Free ctrl device name on init failure ().\n- ocfs2: fix a misuse a of brelse after failing ocfs2_check_dir_entry (bsc#1117817).\n- ocfs2: fix locking for res->tracking and dlm->tracking_list (bsc#1117816).\n- ocfs2: fix ocfs2 read block panic (bsc#1117815).\n- ocfs2: free up write context when direct IO failed (bsc#1117821).\n- ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent (bsc#1117808).\n- of: add helper to lookup compatible child node (bsc#1106110)\n- openvswitch: Fix push/pop ethernet validation (networking-stable-18_11_02).\n- orangefs: fix deadlock; do not write i_size in read_iter (bsc#1051510).\n- orangefs: initialize op on loop restart in orangefs_devreq_read (bsc#1051510).\n- orangefs_kill_sb(): deal with allocation failures (bsc#1051510).\n- orangefs: use list_for_each_entry_safe in purge_waiting_ops (bsc#1051510).\n- PCI: Add Device IDs for Intel GPU 'spurious interrupt' quirk (bsc#1051510).\n- PCI/ASPM: Do not initialize link state when aspm_disabled is set (bsc#1051510).\n- PCI/ASPM: Fix link_state teardown on device removal (bsc#1051510).\n- PCI: dwc: remove duplicate fix References: bsc#1115269 Patch has been already applied by the following commit: 9f73db8b7c PCI: dwc: Fix enumeration end when reaching root subordinate (bsc#1051510)\n- PCI: hv: Do not wait forever on a device that has disappeared (bsc#1109806).\n- PCI: hv: Use effective affinity mask (bsc#1109772).\n- PCI: imx6: Fix link training status detection in link up check (bsc#1109806).\n- PCI: iproc: Remove PAXC slot check to allow VF support (bsc#1109806).\n- PCI/MSI: Warn and return error if driver enables MSI/MSI-X twice (bsc#1051510).\n- PCI: Reprogram bridge prefetch registers on resume (bsc#1051510).\n- PCI: vmd: Assign vector zero to all bridges (bsc#1109806).\n- PCI: vmd: Detach resources after stopping root bus (bsc#1109806).\n- PCI: vmd: White list for fast interrupt handlers (bsc#1109806).\n- pcmcia: Implement CLKRUN protocol disabling for Ricoh bridges (bsc#1051510).\n- percpu: make this_cpu_generic_read() atomic w.r.t. interrupts (bsc#1114279).\n- perf: fix invalid bit in diagnostic entry (git-fixes).\n- pinctrl: at91-pio4: fix has_config check in atmel_pctl_dt_subnode_to_map() (bsc#1051510).\n- pinctrl: meson: fix pinconf bias disable (bsc#1051510).\n- pinctrl: qcom: spmi-mpp: Fix drive strength setting (bsc#1051510).\n- pinctrl: qcom: spmi-mpp: Fix err handling of pmic_mpp_set_mux (bsc#1051510).\n- pinctrl: spmi-mpp: Fix pmic_mpp_config_get() to be compliant (bsc#1051510).\n- pinctrl: ssbi-gpio: Fix pm8xxx_pin_config_get() to be compliant (bsc#1051510).\n- pipe: match pipe_max_size data type with procfs (git-fixes).\n- platform/x86: acerhdf: Add BIOS entry for Gateway LT31 v1.3307 (bsc#1051510).\n- platform/x86: intel_telemetry: report debugfs failure (bsc#1051510).\n- pNFS: Always free the session slot on error in nfs4_layoutget_handle_exception (git-fixes).\n- pNFS: Do not release the sequence slot until we've processed layoutget on open (git-fixes).\n- pNFS: Prevent the layout header refcount going to zero in pnfs_roc() (git-fixes).\n- powerpc/64s/hash: Do not use PPC_INVALIDATE_ERAT on CPUs before POWER9 (bsc#1065729).\n- powerpc/boot: Fix opal console in boot wrapper (bsc#1065729).\n- powerpc/kvm/booke: Fix altivec related build break (bsc#1061840).\n- powerpc/kvm: Switch kvm pmd allocator to custom allocator (bsc#1061840).\n- powerpc/mm: Fix typo in comments (bsc#1065729).\n- powerpc/mm/hugetlb: initialize the pagetable cache correctly for hugetlb (bsc#1091800).\n- powerpc/mm/keys: Move pte bits to correct headers (bsc#1078248).\n- powerpc/mm: Rename find_linux_pte_or_hugepte() (bsc#1061840).\n- powerpc/npu-dma.c: Fix crash after __mmu_notifier_register failure (bsc#1055120).\n- powerpc/perf: Update raw-event code encoding comment for power8 (bsc#1065729).\n- powerpc/powernv: Add indirect levels to it_userspace (bsc#1061840).\n- powerpc/powernv: Do not select the cpufreq governors (bsc#1065729).\n- powerpc/powernv: Fix concurrency issue with npu->mmio_atsd_usage (bsc#1055120).\n- powerpc/powernv: Fix opal_event_shutdown() called with interrupts disabled (bsc#1065729).\n- powerpc/powernv/ioda2: Reduce upper limit for DMA window size (bsc#1055120).\n- powerpc/powernv/ioda: Allocate indirect TCE levels on demand (bsc#1061840).\n- powerpc/powernv/ioda: Finish removing explicit max window size check (bsc#1061840).\n- powerpc/powernv/ioda: Remove explicit max window size check (bsc#1061840).\n- powerpc/powernv: Move TCE manupulation code to its own file (bsc#1061840).\n- powerpc/powernv/npu: Add lock to prevent race in concurrent context init/destroy (bsc#1055120).\n- powerpc/powernv/npu: Do not explicitly flush nmmu tlb (bsc#1055120).\n- powerpc/powernv/npu: Fix deadlock in mmio_invalidate() (bsc#1055120).\n- powerpc/powernv/npu: Prevent overwriting of pnv_npu2_init_contex() callback parameters (bsc#1055120).\n- powerpc/powernv/npu: Use flush_all_mm() instead of flush_tlb_mm() (bsc#1055120).\n- powerpc/powernv/pci: Work around races in PCI bridge enabling (bsc#1055120).\n- powerpc/powernv: Rework TCE level allocation (bsc#1061840).\n- powerpc/pseries: Fix build break for SPLPAR=n and CPU hotplug (bsc#1079524, git-fixes).\n- powerpc/pseries: Fix CONFIG_NUMA=n build (bsc#1067906, git-fixes).\n- powerpc/pseries: Fix DTL buffer registration (bsc#1065729).\n- powerpc/pseries: Fix how we iterate over the DTL entries (bsc#1065729).\n- powerpc/pseries: Fix 'OF: ERROR: Bad of_node_put() on /cpus' during DLPAR (bsc#1113295).\n- powerpc/pseries/mobility: Extend start/stop topology update scope (bsc#1116950, bsc#1115709).\n- powerpc: pseries: remove dlpar_attach_node dependency on full path (bsc#1113295).\n- powerpc/xive: Move definition of ESB bits (bsc#1061840).\n- powerpc/xmon: Add ISA v3.0 SPRs to SPR dump (bsc#1061840).\n- power: supply: max8998-charger: Fix platform data retrieval (bsc#1051510).\n- pppoe: fix reception of frames with no mac header (networking-stable-18_09_24).\n- printk: drop in_nmi check from printk_safe_flush_on_panic() (bsc#1112170).\n- printk: Fix panic caused by passing log_buf_len to command line (bsc#1117168).\n- printk/tracing: Do not trace printk_nmi_enter() (bsc#1112208).\n- provide linux/set_memory.h (bsc#1113295).\n- ptp: fix Spectre v1 vulnerability (bsc#1051510).\n- pwm: lpss: Release runtime-pm reference from the driver's remove callback (bsc#1051510).\n- pxa168fb: prepare the clock (bsc#1051510).\n- qmi_wwan: Added support for Gemalto's Cinterion ALASxx WWAN interface (bsc#1051510).\n- qmi_wwan: apply SET_DTR quirk to the SIMCOM shared device ID (bsc#1051510).\n- qmi_wwan: Support dynamic config on Quectel EP06 (bsc#1051510).\n- qrtr: add MODULE_ALIAS macro to smd (bsc#1051510).\n- r8169: Clear RTL_FLAG_TASK_*_PENDING when clearing RTL_FLAG_TASK_ENABLED (bsc#1051510).\n- r8169: fix NAPI handling under high load (networking-stable-18_11_02).\n- race of lockd inetaddr notifiers vs nlmsvc_rqst change (git-fixes).\n- RAID10 BUG_ON in raise_barrier when force is true and conf->barrier is 0 (git-fixes).\n- random: rate limit unseeded randomness warnings (git-fixes).\n- rculist: add list_for_each_entry_from_rcu() (bsc#1084760).\n- rculist: Improve documentation for list_for_each_entry_from_rcu() (bsc#1084760).\n- rds: fix two RCU related problems (networking-stable-18_09_18).\n- README: Clean-up trailing whitespace\n- reiserfs: add check to detect corrupted directory entry (bsc#1109818).\n- reiserfs: do not panic on bad directory entries (bsc#1109818).\n- remoteproc: qcom: Fix potential device node leaks (bsc#1051510).\n- rename a hv patch to reduce conflicts in -AZURE\n- reset: hisilicon: fix potential NULL pointer dereference (bsc#1051510).\n- reset: imx7: Fix always writing bits as 0 (bsc#1051510).\n- resource: Include resource end in walk_*() interfaces (bsc#1114279).\n- Revert 'ceph: fix dentry leak in splice_dentry()' (bsc#1114839).\n- Revert 'powerpc/64: Fix checksum folding in csum_add()' (bsc#1065729).\n- Revert 'rpm/kernel-binary.spec.in: allow unsupported modules for -extra'\n- Revert 'usb: dwc3: gadget: skip Set/Clear Halt when invalid' (bsc#1051510).\n- rpmsg: Correct support for MODULE_DEVICE_TABLE() (git-fixes).\n- rtnetlink: Disallow FDB configuration for non-Ethernet device (networking-stable-18_11_02).\n- rtnetlink: fix rtnl_fdb_dump() for ndmsg header (networking-stable-18_10_16).\n- rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096 (networking-stable-18_10_16).\n- s390/cpum_sf: Add data entry sizes to sampling trailer entry (git-fixes).\n- s390/kvm: fix deadlock when killed by oom (bnc#1113501, LTC#172235).\n- s390/mm: Check for valid vma before zapping in gmap_discard (git-fixes).\n- s390/mm: correct allocate_pgste proc_handler callback (git-fixes).\n- s390: qeth_core_mpc: Use ARRAY_SIZE instead of reimplementing its function (bnc#1113501, LTC#172682).\n- s390/qeth: fix HiperSockets sniffer (bnc#1113501, LTC#172953).\n- s390: qeth: Fix potential array overrun in cmd/rc lookup (bnc#1113501, LTC#172682).\n- s390/qeth: handle failure on workqueue creation (git-fixes).\n- s390/qeth: report 25Gbit link speed (bnc#1113501, LTC#172959).\n- s390: revert ELF_ET_DYN_BASE base changes (git-fixes).\n- s390/sclp_tty: enable line mode tty even if there is an ascii console (git-fixes).\n- s390/sthyi: add cache to store hypervisor info (LTC#160415, bsc#1068273).\n- s390/sthyi: add s390_sthyi system call (LTC#160415, bsc#1068273).\n- s390/sthyi: reorganize sthyi implementation (LTC#160415, bsc#1068273).\n- sched/numa: Limit the conditions where scan period is reset ().\n- scsi: core: Allow state transitions from OFFLINE to BLOCKED (bsc#1112246).\n- scsi: core: Allow state transitions from OFFLINE to BLOCKED (bsc#1112246).\n- scsi: core: Avoid that SCSI device removal through sysfs triggers a deadlock (bsc#1114578).\n- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1104731).\n- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1104731).\n- scsi: libfc: retry PRLI if we cannot analyse the payload (bsc#1104731).\n- scsi: libfc: retry PRLI if we cannot analyse the payload (bsc#1104731).\n- scsi: libsas: remove irq save in sas_ata_qc_issue() (bsc#1114580).\n- scsi: lpfc: add support to retrieve firmware logs (bsc#1114015).\n- scsi: lpfc: add Trunking support (bsc#1114015).\n- scsi: lpfc: Correct errors accessing fw log (bsc#1114015).\n- scsi: lpfc: Correct invalid EQ doorbell write on if_type=6 (bsc#1114015).\n- scsi: lpfc: Correct irq handling via locks when taking adapter offline (bsc#1114015).\n- scsi: lpfc: Correct LCB RJT handling (bsc#1114015).\n- scsi: lpfc: Correct loss of fc4 type on remote port address change (bsc#1114015).\n- scsi: lpfc: Correct race with abort on completion path (bsc#1114015).\n- scsi: lpfc: Correct soft lockup when running mds diagnostics (bsc#1114015).\n- scsi: lpfc: Correct speeds on SFP swap (bsc#1114015).\n- scsi: lpfc: fcoe: Fix link down issue after 1000+ link bounces (bsc#1114015).\n- scsi: lpfc: Fix errors in log messages (bsc#1114015).\n- scsi: lpfc: Fix GFT_ID and PRLI logic for RSCN (bsc#1114015).\n- scsi: lpfc: Fix LOGO/PLOGI handling when triggerd by ABTS Timeout event (bsc#1114015).\n- scsi: lpfc: Fix lpfc_sli4_read_config return value check (bsc#1114015).\n- scsi: lpfc: Fix odd recovery in duplicate FLOGIs in point-to-point (bsc#1114015).\n- scsi: lpfc: Implement GID_PT on Nameserver query to support faster failover (bsc#1114015).\n- scsi: lpfc: Raise nvme defaults to support a larger io and more connectivity (bsc#1114015).\n- scsi: lpfc: raise sg count for nvme to use available sg resources (bsc#1114015).\n- scsi: lpfc: reduce locking when updating statistics (bsc#1114015).\n- scsi: lpfc: Remove set but not used variable 'sgl_size' (bsc#1114015).\n- scsi: lpfc: Reset link or adapter instead of doing infinite nameserver PLOGI retry (bsc#1114015).\n- scsi: lpfc: Synchronize access to remoteport via rport (bsc#1114015).\n- scsi: lpfc: update driver version to 12.0.0.7 (bsc#1114015).\n- scsi: lpfc: update driver version to 12.0.0.8 (bsc#1114015).\n- scsi: qlogicpti: Fix an error handling path in 'qpti_sbus_probe()' (bsc#1114581).\n- scsi: scsi_transport_srp: Fix shost to rport translation (bsc#1114582).\n- scsi: sg: fix minor memory leak in error path (bsc#1114584).\n- scsi: sysfs: Introduce sysfs_{un,}break_active_protection() (bsc#1114578).\n- scsi: target: Fix fortify_panic kernel exception (bsc#1114576).\n- scsi: target/tcm_loop: Avoid that static checkers warn about dead code (bsc#1114577).\n- scsi: target: tcmu: add read length support (bsc#1097755).\n- sctp: fix race on sctp_id2asoc (networking-stable-18_11_02).\n- sctp: fix strchange_flags name for Stream Change Event (networking-stable-18_11_21).\n- sctp: hold transport before accessing its asoc in sctp_transport_get_next (networking-stable-18_09_11).\n- sctp: not allow to set asoc prsctp_enable by sockopt (networking-stable-18_11_21).\n- sctp: not increase stream's incnt before sending addstrm_in request (networking-stable-18_11_21).\n- sctp: update dst pmtu with the correct daddr (networking-stable-18_10_16).\n- serial: 8250: Fix clearing FIFOs in RS485 mode again (bsc#1051510).\n- signal: Properly deliver SIGSEGV from x86 uprobes (bsc#1110006).\n- skip LAYOUTRETURN if layout is invalid (git-fixes).\n- smb2: fix missing files in root share directory listing (bsc#1112907).\n- smb2: fix missing files in root share directory listing (bsc#1112907).\n- smb3: fill in statfs fsid and correct namelen (bsc#1112905).\n- smb3: fill in statfs fsid and correct namelen (bsc#1112905).\n- smb3: fix reset of bytes read and written stats (bsc#1112906).\n- smb3: fix reset of bytes read and written stats (bsc#1112906).\n- smb3: on reconnect set PreviousSessionId field (bsc#1112899).\n- smb3: on reconnect set PreviousSessionId field (bsc#1112899).\n- soc: fsl: qbman: qman: avoid allocating from non existing gen_pool (bsc#1051510).\n- soc/tegra: pmc: Fix child-node lookup (bsc#1051510).\n- soc: ti: QMSS: Fix usage of irq_set_affinity_hint (bsc#1051510).\n- sound: do not call skl_init_chip() to reset intel skl soc (bsc#1051510).\n- sound: enable interrupt after dma buffer initialization (bsc#1051510).\n- spi/bcm63xx-hsspi: keep pll clk enabled (bsc#1051510).\n- spi: bcm-qspi: switch back to reading flash using smaller chunks (bsc#1051510).\n- spi: sh-msiof: fix deferred probing (bsc#1051510).\n- staging: comedi: ni_mio_common: protect register write overflow (bsc#1051510).\n- staging:iio:ad7606: fix voltage scales (bsc#1051510).\n- staging: rtl8723bs: Fix the return value in case of error in 'rtw_wx_read32()' (bsc#1051510).\n- staging: vchiq_arm: fix compat VCHIQ_IOC_AWAIT_COMPLETION (bsc#1051510).\n- sunrpc: Allow connect to return EHOSTUNREACH (git-fixes).\n- sunrpc: Do not use stack buffer with scatterlist (git-fixes).\n- sunrpc: Fix rpc_task_begin trace point (git-fixes).\n- sunrpc: Fix tracepoint storage issues with svc_recv and svc_rqst_status (git-fixes).\n- target: fix buffer offset in core_scsi3_pri_read_full_status (bsc1117349).\n- target: log Data-Out timeouts as errors (bsc#1095805).\n- target: log NOP ping timeouts as errors (bsc#1095805).\n- target: split out helper for cxn timeout error stashing (bsc#1095805).\n- target: stash sess_err_stats on Data-Out timeout (bsc#1095805).\n- target: use ISCSI_IQN_LEN in iscsi_target_stat (bsc#1095805).\n- tcp: do not restart timewait timer on rst reception (networking-stable-18_09_11).\n- test_firmware: fix error return getting clobbered (bsc#1051510).\n- tg3: Add PHY reset for 5717/5719/5720 in change ring and flow control paths (networking-stable-18_11_21).\n- thermal: bcm2835: enable hwmon explicitly (bsc#1108468).\n- thermal: da9062/61: Prevent hardware access during system suspend (bsc#1051510).\n- thermal: rcar_thermal: Prevent hardware access during system suspend (bsc#1051510).\n- tipc: do not assume linear buffer when reading ancillary data (networking-stable-18_11_21).\n- tipc: fix a missing rhashtable_walk_exit() (networking-stable-18_09_11).\n- tipc: fix flow control accounting for implicit connect (networking-stable-18_10_16).\n- tools build: fix # escaping in .cmd files for future Make (git-fixes).\n- tools/testing/nvdimm: advertise a write cache for nfit_test (bsc#1112128).\n- tools/testing/nvdimm: allow custom error code injection (bsc#1112128).\n- tools/testing/nvdimm: disable labels for nfit_test.1 (bsc#1112128).\n- tools/testing/nvdimm: enable labels for nfit_test.1 dimms (bsc#1112128).\n- tools/testing/nvdimm: fix missing newline in nfit_test_dimm 'handle' attribute (bsc#1112128).\n- tools/testing/nvdimm: Fix support for emulating controller temperature (bsc#1112128).\n- tools/testing/nvdimm: force nfit_test to depend on instrumented modules (bsc#1112128).\n- tools/testing/nvdimm: improve emulation of smart injection (bsc#1112128).\n- tools/testing/nvdimm: kaddr and pfn can be NULL to ->direct_access() (bsc#1112128).\n- tools/testing/nvdimm: Make DSM failure code injection an override (bsc#1112128).\n- tools/testing/nvdimm: smart alarm/threshold control (bsc#1112128).\n- tools/testing/nvdimm: stricter bounds checking for error injection commands (bsc#1112128).\n- tools/testing/nvdimm: support nfit_test_dimm attributes under nfit_test.1 (bsc#1112128).\n- tools/testing/nvdimm: unit test clear-error commands (bsc#1112128).\n- tools/vm/page-types.c: fix 'defined but not used' warning (bsc#1051510).\n- tools/vm/slabinfo.c: fix sign-compare warning (bsc#1051510).\n- tpm2-cmd: allow more attempts for selftest execution (bsc#1082555).\n- tpm: add retry logic (bsc#1082555).\n- tpm: consolidate the TPM startup code (bsc#1082555).\n- tpm: do not suspend/resume if power stays on (bsc#1082555).\n- tpm: fix intermittent failure with self tests (bsc#1082555).\n- tpm: fix response size validation in tpm_get_random() (bsc#1082555).\n- tpm: move endianness conversion of ordinals to tpm_input_header (bsc#1082555).\n- tpm: move endianness conversion of TPM_TAG_RQU_COMMAND to tpm_input_header (bsc#1082555).\n- tpm: move the delay_msec increment after sleep in tpm_transmit() (bsc#1082555).\n- tpm: React correctly to RC_TESTING from TPM 2.0 self tests (bsc#1082555).\n- tpm: replace msleep() with usleep_range() in TPM 1.2/2.0 generic drivers (bsc#1082555).\n- tpm: Restore functionality to xen vtpm driver (bsc#1082555).\n- tpm: self test failure should not cause suspend to fail (bsc#1082555).\n- tpm: tpm-interface: fix tpm_transmit/_cmd kdoc (bsc#1082555).\n- tpm: Trigger only missing TPM 2.0 self tests (bsc#1082555).\n- tpm: Use dynamic delay to wait for TPM 2.0 self test result (bsc#1082555).\n- tpm: use tpm2_pcr_read() in tpm2_do_selftest() (bsc#1082555).\n- tpm: use tpm_buf functions in tpm2_pcr_read() (bsc#1082555).\n- tracing: Add barrier to trace_printk() buffer nesting modification (bsc#1112219).\n- tracing: Apply trace_clock changes to instance max buffer (bsc#1117188).\n- tracing: Erase irqsoff trace with empty write (bsc#1117189).\n- tty: check name length in tty_find_polling_driver() (bsc#1051510).\n- tty: Do not block on IO when ldisc change is pending (bnc#1105428).\n- tty: fix data race between tty_init_dev and flush of buf (bnc#1105428).\n- tty: Hold tty_ldisc_lock() during tty_reopen() (bnc#1105428).\n- tty/ldsem: Add lockdep asserts for ldisc_sem (bnc#1105428).\n- tty/ldsem: Convert to regular lockdep annotations (bnc#1105428).\n- tty/ldsem: Decrement wait_readers on timeouted down_read() (bnc#1105428).\n- tty/ldsem: Wake up readers after timed out down_write() (bnc#1105428).\n- tty: Simplify tty->count math in tty_reopen() (bnc#1105428).\n- tty: wipe buffer (bsc#1051510).\n- tty: wipe buffer if not echoing data (bsc#1051510).\n- tun: Consistently configure generic netdev params via rtnetlink (bsc#1051510).\n- tuntap: fix multiqueue rx (networking-stable-18_11_21).\n- udp4: fix IP_CMSG_CHECKSUM for connected sockets (networking-stable-18_09_24).\n- udp6: add missing checks on edumux packet processing (networking-stable-18_09_24).\n- udp6: fix encap return code for resubmitting (git-fixes).\n- uio: ensure class is registered before devices (bsc#1051510).\n- uio: Fix an Oops on load (bsc#1051510).\n- uio: make symbol 'uio_class_registered' static (bsc#1051510).\n- Update config files. Enabled ENA (Amazon network driver) for arm64.\n- usb: cdc-acm: add entry for Hiro (Conexant) modem (bsc#1051510).\n- usb: chipidea: Prevent unbalanced IRQ disable (bsc#1051510).\n- usb: core: Fix hub port connection events lost (bsc#1051510).\n- usb: dwc2: host: do not delay retries for CONTROL IN transfers (bsc#1114385).\n- usb: dwc2: host: Do not retry NAKed transactions right away (bsc#1114385).\n- usb: dwc3: core: Clean up ULPI device (bsc#1051510).\n- usb: dwc3: gadget: fix ISOC TRB type on unaligned transfers (bsc#1051510).\n- usb: dwc3: gadget: Properly check last unaligned/zero chain TRB (bsc#1051510).\n- usb: gadget: fsl_udc_core: check allocation return value and cleanup on failure (bsc#1051510).\n- usb: gadget: fsl_udc_core: fixup struct_udc_setup documentation (bsc#1051510).\n- usb: gadget: storage: Fix Spectre v1 vulnerability (bsc#1051510).\n- usb: gadget: udc: atmel: handle at91sam9rl PMC (bsc#1051510).\n- usb: gadget: u_ether: fix unsafe list iteration (bsc#1051510).\n- usb: host: ohci-at91: fix request of irq for optional gpio (bsc#1051510).\n- usbip: tools: fix atoi() on non-null terminated string (bsc#1051510).\n- usbip:vudc: BUG kmalloc-2048 (Not tainted): Poison overwritten (bsc#1051510).\n- usb: misc: appledisplay: add 20' Apple Cinema Display (bsc#1051510).\n- usbnet: smsc95xx: disable carrier check while suspending (bsc#1051510).\n- usb: omap_udc: fix rejection of out transfers when DMA is used (bsc#1051510).\n- usb: quirks: Add delay-init quirk for Corsair K70 LUX RGB (bsc#1051510).\n- usb: quirks: Add no-lpm quirk for Raydium touchscreens (bsc#1051510).\n- usb: remove LPM management from usb_driver_claim_interface() (bsc#1051510).\n- usb: serial: cypress_m8: fix interrupt-out transfer length (bsc#1051510).\n- usb: serial: option: add two-endpoints device-id flag (bsc#1051510).\n- usb: serial: option: drop redundant interface-class test (bsc#1051510).\n- usb: serial: option: improve Quectel EP06 detection (bsc#1051510).\n- usb: xhci: fix timeout for transition from RExit to U0 (bsc#1051510).\n- userfaultfd: hugetlbfs: fix userfaultfd_huge_must_wait() pte access (bsc#1109739).\n- Use upstream version of pci-hyperv patch (35a88a1)\n- VFS: close race between getcwd() and d_move() (git-fixes).\n- VFS: fix freeze protection in mnt_want_write_file() for overlayfs (git-fixes).\n- vhost: Fix Spectre V1 vulnerability (bsc#1051510).\n- vhost/scsi: truncate T10 PI iov_iter to prot_bytes (bsc#1051510).\n- virtio_net: avoid using netif_tx_disable() for serializing tx routine (networking-stable-18_11_02).\n- VMCI: Resource wildcard match fixed (bsc#1051510).\n- w1: omap-hdq: fix missing bus unregister at removal (bsc#1051510).\n- Workaround for mysterious NVMe breakage with i915 CFL (bsc#1111040).\n- x86/acpi: Prevent X2APIC id 0xffffffff from being accounted (bsc#1110006).\n- x86/boot/KASLR: Work around firmware bugs by excluding EFI_BOOT_SERVICES_* and EFI_LOADER_* from KASLR's choice (bnc#1112878).\n- x86/boot: Move EISA setup to a separate file (bsc#1110006).\n- x86/corruption-check: Fix panic in memory_corruption_check() when boot option without value is provided (bsc#1110006).\n- x86/cpufeature: Add User-Mode Instruction Prevention definitions (bsc#1110006).\n- x86/cpufeatures: Add Intel Total Memory Encryption cpufeature (bsc#1110006).\n- x86/cpu/vmware: Do not trace vmware_sched_clock() (bsc#1114279).\n- x86/eisa: Add missing include (bsc#1110006).\n- x86/EISA: Do not probe EISA bus for Xen PV guests (bsc#1110006).\n- x86/fpu: Remove second definition of fpu in __fpu__restore_sig() (bsc#1110006).\n- x86, hibernate: Fix nosave_regions setup for hibernation (bsc#1110006).\n- x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772).\n- x86/kasan: Panic if there is not enough memory to boot (bsc#1110006).\n- x86/kexec: Correct KEXEC_BACKUP_SRC_END off-by-one error (bsc#1114279).\n- x86/ldt: Remove unused variable in map_ldt_struct() (bsc#1114279).\n- x86/ldt: Split out sanity check in map_ldt_struct() (bsc#1114279).\n- x86/ldt: Unmap PTEs for the slot before freeing LDT pages (bsc#1114279).\n- x86/MCE/AMD: Fix the thresholding machinery initialization order (bsc#1114279).\n- x86/MCE: Fix stack out-of-bounds write in mce-inject.c: Flags_read() (bsc#1110006).\n- x86/MCE: Make correctable error detection look at the Deferred bit (bsc#1114279).\n- x86/mm/pat: Disable preemption around __flush_tlb_all() (bsc#1114279).\n- x86, nfit_test: Add unit test for memcpy_mcsafe() (bsc#1112128).\n- x86/paravirt: Fix some warning messages (bnc#1065600).\n- x86/percpu: Fix this_cpu_read() (bsc#1110006).\n- x86/speculation: Support Enhanced IBRS on future CPUs ().\n- x86/time: Correct the attribute on jiffies' definition (bsc#1110006).\n- x86/xen: Fix boot loader version reported for PVH guests (bnc#1065600).\n- xen/balloon: Support xend-based toolstack (bnc#1065600).\n- xen/blkfront: avoid NULL blkfront_info dereference on device removal (bsc#1111062).\n- xen: fix race in xen_qlock_wait() (bnc#1107256).\n- xen: fix xen_qlock_wait() (bnc#1107256).\n- xen/gntdev: avoid out of bounds access in case of partial gntdev_mmap() (bnc#1065600).\n- xen: make xen_qlock_wait() nestable (bnc#1107256).\n- xen/netfront: do not bug in case of too many frags (bnc#1104824).\n- xen/pvh: do not try to unplug emulated devices (bnc#1065600).\n- xen/pvh: increase early stack size (bnc#1065600).\n- xen: Remove unnecessary BUG_ON from __unbind_from_irq() (bnc#1065600).\n- xen-swiotlb: fix the check condition for xen_swiotlb_free_coherent (bnc#1065600).\n- xen-swiotlb: use actually allocated size on check physical continuous (bnc#1065600).\n- xen/x86: add diagnostic printout to xen_mc_flush() in case of error (bnc#1116183).\n- xfrm: use complete IPv6 addresses for hash (bsc#1109330).\n- xfs: do not fail when converting shortform attr to long form during ATTR_REPLACE (bsc#1105025).\n- xfs: Fix error code in 'xfs_ioc_getbmap()' (git-fixes).\n- xfs: Properly detect when DAX won't be used on any device (bsc#1115976).\n- xhci: Add check for invalid byte size error when UAS devices are connected (bsc#1051510).\n- xhci: Do not print a warning when setting link state for disabled ports (bsc#1051510).\n- xhci: Fix leaking USB3 shared_hcd at xhci removal (bsc#1051510).\n- xprtrdma: Do not defer fencing an async RPC's chunks (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-DESKTOP-12-SP4-2018-2894,SUSE-SLE-HA-12-SP4-2018-2894,SUSE-SLE-SDK-12-SP4-2018-2894,SUSE-SLE-SERVER-12-SP4-2018-2894,SUSE-SLE-WE-12-SP4-2018-2894", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_4069-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:4069-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20184069-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:4069-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-December/004951.html", }, { category: "self", summary: "SUSE Bug 1051510", url: "https://bugzilla.suse.com/1051510", }, { category: "self", summary: "SUSE Bug 1055120", url: "https://bugzilla.suse.com/1055120", }, { category: "self", summary: "SUSE Bug 1061840", url: "https://bugzilla.suse.com/1061840", }, { category: "self", summary: "SUSE Bug 1065600", url: "https://bugzilla.suse.com/1065600", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1066674", url: "https://bugzilla.suse.com/1066674", }, { category: "self", summary: "SUSE Bug 1067906", url: "https://bugzilla.suse.com/1067906", }, { category: "self", summary: "SUSE Bug 1068273", url: "https://bugzilla.suse.com/1068273", }, { category: "self", summary: "SUSE Bug 1076830", url: "https://bugzilla.suse.com/1076830", }, { category: "self", summary: "SUSE Bug 1078248", url: "https://bugzilla.suse.com/1078248", }, { category: "self", summary: "SUSE Bug 1079524", url: "https://bugzilla.suse.com/1079524", }, { category: "self", summary: "SUSE Bug 1082555", url: "https://bugzilla.suse.com/1082555", }, { category: "self", summary: "SUSE Bug 1082653", url: "https://bugzilla.suse.com/1082653", }, { category: "self", summary: "SUSE Bug 1083647", url: "https://bugzilla.suse.com/1083647", }, { category: "self", summary: "SUSE Bug 1084760", url: "https://bugzilla.suse.com/1084760", }, { category: "self", summary: "SUSE Bug 1084831", url: "https://bugzilla.suse.com/1084831", }, { category: "self", summary: "SUSE Bug 1085535", url: "https://bugzilla.suse.com/1085535", }, { category: "self", summary: "SUSE Bug 1086196", url: "https://bugzilla.suse.com/1086196", }, { category: "self", summary: "SUSE Bug 1089350", url: "https://bugzilla.suse.com/1089350", }, { category: "self", summary: "SUSE Bug 1091800", url: "https://bugzilla.suse.com/1091800", }, { category: "self", summary: "SUSE Bug 1094825", url: "https://bugzilla.suse.com/1094825", }, { category: "self", summary: "SUSE Bug 1095805", url: "https://bugzilla.suse.com/1095805", }, { category: "self", summary: "SUSE Bug 1097755", url: "https://bugzilla.suse.com/1097755", }, { category: "self", summary: "SUSE Bug 1100132", url: "https://bugzilla.suse.com/1100132", }, { category: "self", summary: "SUSE Bug 1103356", url: "https://bugzilla.suse.com/1103356", }, { category: "self", summary: "SUSE Bug 1103925", url: "https://bugzilla.suse.com/1103925", }, { category: "self", summary: "SUSE Bug 1104124", url: "https://bugzilla.suse.com/1104124", }, { category: "self", summary: "SUSE Bug 1104731", url: "https://bugzilla.suse.com/1104731", }, { category: "self", summary: "SUSE Bug 1104824", url: "https://bugzilla.suse.com/1104824", }, { category: "self", summary: "SUSE Bug 1105025", url: "https://bugzilla.suse.com/1105025", }, { category: "self", summary: "SUSE Bug 1105428", url: "https://bugzilla.suse.com/1105428", }, { category: "self", summary: "SUSE Bug 1106105", url: "https://bugzilla.suse.com/1106105", }, { category: "self", summary: "SUSE Bug 1106110", url: "https://bugzilla.suse.com/1106110", }, { category: "self", summary: "SUSE Bug 1106237", url: "https://bugzilla.suse.com/1106237", }, { category: "self", summary: "SUSE Bug 1106240", url: "https://bugzilla.suse.com/1106240", }, { category: "self", summary: "SUSE Bug 1107256", url: "https://bugzilla.suse.com/1107256", }, { category: "self", summary: "SUSE Bug 1107385", url: "https://bugzilla.suse.com/1107385", }, { category: "self", summary: "SUSE Bug 1107866", url: "https://bugzilla.suse.com/1107866", }, { category: "self", summary: "SUSE Bug 1108377", url: "https://bugzilla.suse.com/1108377", }, { category: "self", summary: "SUSE Bug 1108468", url: "https://bugzilla.suse.com/1108468", }, { category: "self", summary: "SUSE Bug 1109330", url: "https://bugzilla.suse.com/1109330", }, { category: "self", summary: "SUSE Bug 1109739", url: "https://bugzilla.suse.com/1109739", }, { category: "self", summary: "SUSE Bug 1109772", url: "https://bugzilla.suse.com/1109772", }, { category: "self", summary: "SUSE Bug 1109806", url: "https://bugzilla.suse.com/1109806", }, { category: "self", summary: "SUSE Bug 1109818", url: "https://bugzilla.suse.com/1109818", }, { category: "self", summary: "SUSE Bug 1109907", url: "https://bugzilla.suse.com/1109907", }, { category: "self", summary: "SUSE Bug 1109911", url: "https://bugzilla.suse.com/1109911", }, { category: "self", summary: "SUSE Bug 1109915", url: "https://bugzilla.suse.com/1109915", }, { category: "self", summary: "SUSE Bug 1109919", url: "https://bugzilla.suse.com/1109919", }, { category: "self", summary: "SUSE Bug 1109951", url: "https://bugzilla.suse.com/1109951", }, { category: "self", summary: "SUSE Bug 1110006", url: "https://bugzilla.suse.com/1110006", }, { category: "self", summary: "SUSE Bug 1110998", url: "https://bugzilla.suse.com/1110998", }, { category: "self", summary: "SUSE Bug 1111040", url: "https://bugzilla.suse.com/1111040", }, { category: "self", summary: "SUSE Bug 1111062", url: "https://bugzilla.suse.com/1111062", }, { category: "self", summary: "SUSE Bug 1111174", url: "https://bugzilla.suse.com/1111174", }, { category: "self", summary: "SUSE Bug 1111506", url: "https://bugzilla.suse.com/1111506", }, { category: "self", summary: "SUSE Bug 1111696", url: "https://bugzilla.suse.com/1111696", }, { category: "self", summary: "SUSE Bug 1111809", url: "https://bugzilla.suse.com/1111809", }, { category: "self", summary: "SUSE Bug 1111921", url: "https://bugzilla.suse.com/1111921", }, { category: "self", summary: "SUSE Bug 1111983", url: "https://bugzilla.suse.com/1111983", }, { category: "self", summary: "SUSE Bug 1112128", url: "https://bugzilla.suse.com/1112128", }, { category: "self", summary: "SUSE Bug 1112170", url: "https://bugzilla.suse.com/1112170", }, { category: "self", summary: "SUSE Bug 1112173", url: "https://bugzilla.suse.com/1112173", }, { category: "self", summary: "SUSE Bug 1112208", url: "https://bugzilla.suse.com/1112208", }, { category: "self", summary: "SUSE Bug 1112219", url: "https://bugzilla.suse.com/1112219", }, { category: "self", summary: "SUSE Bug 1112221", url: "https://bugzilla.suse.com/1112221", }, { category: "self", summary: "SUSE Bug 1112246", url: "https://bugzilla.suse.com/1112246", }, { category: "self", summary: "SUSE Bug 1112372", url: "https://bugzilla.suse.com/1112372", }, { category: "self", summary: "SUSE Bug 1112514", url: "https://bugzilla.suse.com/1112514", }, { category: "self", summary: "SUSE Bug 1112554", url: "https://bugzilla.suse.com/1112554", }, { category: "self", summary: "SUSE Bug 1112708", url: "https://bugzilla.suse.com/1112708", }, { category: "self", summary: "SUSE Bug 1112710", url: "https://bugzilla.suse.com/1112710", }, { category: "self", summary: "SUSE Bug 1112711", url: "https://bugzilla.suse.com/1112711", }, { category: "self", summary: "SUSE Bug 1112712", url: "https://bugzilla.suse.com/1112712", }, { category: "self", summary: "SUSE Bug 1112713", url: "https://bugzilla.suse.com/1112713", }, { category: "self", summary: "SUSE Bug 1112731", url: "https://bugzilla.suse.com/1112731", }, { category: "self", summary: "SUSE Bug 1112732", url: "https://bugzilla.suse.com/1112732", }, { category: "self", summary: "SUSE Bug 1112733", url: "https://bugzilla.suse.com/1112733", }, { category: "self", summary: "SUSE Bug 1112734", url: "https://bugzilla.suse.com/1112734", }, { category: "self", summary: "SUSE Bug 1112735", url: "https://bugzilla.suse.com/1112735", }, { category: "self", summary: "SUSE Bug 1112736", url: "https://bugzilla.suse.com/1112736", }, { category: "self", summary: "SUSE Bug 1112738", url: "https://bugzilla.suse.com/1112738", }, { category: "self", summary: "SUSE Bug 1112739", url: "https://bugzilla.suse.com/1112739", }, { category: "self", summary: "SUSE Bug 1112740", url: "https://bugzilla.suse.com/1112740", }, { category: "self", summary: "SUSE Bug 1112741", url: "https://bugzilla.suse.com/1112741", }, { category: "self", summary: "SUSE Bug 1112743", url: "https://bugzilla.suse.com/1112743", }, { category: "self", summary: "SUSE Bug 1112745", url: "https://bugzilla.suse.com/1112745", }, { category: "self", summary: "SUSE Bug 1112746", url: "https://bugzilla.suse.com/1112746", }, { category: "self", summary: "SUSE Bug 1112878", url: "https://bugzilla.suse.com/1112878", }, { category: "self", summary: "SUSE Bug 1112894", url: "https://bugzilla.suse.com/1112894", }, { category: "self", summary: "SUSE Bug 1112899", url: "https://bugzilla.suse.com/1112899", }, { category: "self", summary: "SUSE Bug 1112902", url: "https://bugzilla.suse.com/1112902", }, { category: "self", summary: "SUSE Bug 1112903", url: "https://bugzilla.suse.com/1112903", }, { category: "self", summary: "SUSE Bug 1112905", url: "https://bugzilla.suse.com/1112905", }, { category: "self", summary: "SUSE Bug 1112906", url: "https://bugzilla.suse.com/1112906", }, { category: "self", summary: "SUSE Bug 1112907", url: "https://bugzilla.suse.com/1112907", }, { category: "self", summary: "SUSE Bug 1112963", url: "https://bugzilla.suse.com/1112963", }, { category: "self", summary: "SUSE Bug 1113257", url: "https://bugzilla.suse.com/1113257", }, { category: "self", summary: "SUSE Bug 1113284", url: "https://bugzilla.suse.com/1113284", }, { category: "self", summary: "SUSE Bug 1113295", url: "https://bugzilla.suse.com/1113295", }, { category: "self", summary: "SUSE Bug 1113408", url: "https://bugzilla.suse.com/1113408", }, { category: "self", summary: "SUSE Bug 1113412", url: "https://bugzilla.suse.com/1113412", }, { category: "self", summary: "SUSE Bug 1113501", url: "https://bugzilla.suse.com/1113501", }, { category: "self", summary: "SUSE Bug 1113667", url: "https://bugzilla.suse.com/1113667", }, { category: "self", summary: "SUSE Bug 1113677", url: "https://bugzilla.suse.com/1113677", }, { category: "self", summary: "SUSE Bug 1113722", url: "https://bugzilla.suse.com/1113722", }, { category: "self", summary: "SUSE Bug 1113751", url: "https://bugzilla.suse.com/1113751", }, { category: "self", summary: "SUSE Bug 1113769", url: "https://bugzilla.suse.com/1113769", }, { category: "self", summary: "SUSE Bug 1113780", url: "https://bugzilla.suse.com/1113780", }, { category: "self", summary: "SUSE Bug 1113972", url: "https://bugzilla.suse.com/1113972", }, { category: "self", summary: "SUSE Bug 1114015", url: "https://bugzilla.suse.com/1114015", }, { category: "self", summary: "SUSE Bug 1114178", url: "https://bugzilla.suse.com/1114178", }, { category: "self", summary: "SUSE Bug 1114279", url: "https://bugzilla.suse.com/1114279", }, { category: "self", summary: "SUSE Bug 1114385", url: "https://bugzilla.suse.com/1114385", }, { category: "self", summary: "SUSE Bug 1114576", url: "https://bugzilla.suse.com/1114576", }, { category: "self", summary: "SUSE Bug 1114577", url: "https://bugzilla.suse.com/1114577", }, { category: "self", summary: "SUSE Bug 1114578", url: "https://bugzilla.suse.com/1114578", }, { category: "self", summary: "SUSE Bug 1114579", url: "https://bugzilla.suse.com/1114579", }, { category: "self", summary: "SUSE Bug 1114580", url: "https://bugzilla.suse.com/1114580", }, { category: "self", summary: "SUSE Bug 1114581", url: "https://bugzilla.suse.com/1114581", }, { category: "self", summary: "SUSE Bug 1114582", url: "https://bugzilla.suse.com/1114582", }, { category: "self", summary: "SUSE Bug 1114583", url: "https://bugzilla.suse.com/1114583", }, { category: "self", summary: "SUSE Bug 1114584", url: "https://bugzilla.suse.com/1114584", }, { category: "self", summary: "SUSE Bug 1114585", url: "https://bugzilla.suse.com/1114585", }, { category: "self", summary: "SUSE Bug 1114839", url: "https://bugzilla.suse.com/1114839", }, { category: "self", summary: "SUSE Bug 1115074", url: "https://bugzilla.suse.com/1115074", }, { category: "self", summary: "SUSE Bug 1115269", url: "https://bugzilla.suse.com/1115269", }, { category: "self", summary: "SUSE Bug 1115431", url: "https://bugzilla.suse.com/1115431", }, { category: "self", summary: "SUSE Bug 1115433", url: "https://bugzilla.suse.com/1115433", }, { category: "self", summary: "SUSE Bug 1115440", url: "https://bugzilla.suse.com/1115440", }, { category: "self", summary: "SUSE Bug 1115567", url: "https://bugzilla.suse.com/1115567", }, { category: "self", summary: "SUSE Bug 1115709", url: "https://bugzilla.suse.com/1115709", }, { category: "self", summary: "SUSE Bug 1115976", url: "https://bugzilla.suse.com/1115976", }, { category: "self", summary: "SUSE Bug 1116183", url: "https://bugzilla.suse.com/1116183", }, { category: "self", summary: "SUSE Bug 1116692", url: "https://bugzilla.suse.com/1116692", }, { category: "self", summary: "SUSE Bug 1116693", url: "https://bugzilla.suse.com/1116693", }, { category: "self", summary: "SUSE Bug 1116698", url: "https://bugzilla.suse.com/1116698", }, { category: "self", summary: "SUSE Bug 1116699", url: "https://bugzilla.suse.com/1116699", }, { category: "self", summary: "SUSE Bug 1116700", url: "https://bugzilla.suse.com/1116700", }, { category: "self", summary: "SUSE Bug 1116701", url: "https://bugzilla.suse.com/1116701", }, { category: "self", summary: "SUSE Bug 1116862", url: "https://bugzilla.suse.com/1116862", }, { category: "self", summary: "SUSE Bug 1116863", url: "https://bugzilla.suse.com/1116863", }, { category: "self", summary: "SUSE Bug 1116876", url: "https://bugzilla.suse.com/1116876", }, { category: "self", summary: "SUSE Bug 1116877", url: "https://bugzilla.suse.com/1116877", }, { category: "self", summary: "SUSE Bug 1116878", url: "https://bugzilla.suse.com/1116878", }, { category: "self", summary: "SUSE Bug 1116891", url: "https://bugzilla.suse.com/1116891", }, { category: "self", summary: "SUSE Bug 1116895", url: "https://bugzilla.suse.com/1116895", }, { category: "self", summary: "SUSE Bug 1116899", url: "https://bugzilla.suse.com/1116899", }, { category: "self", summary: "SUSE Bug 1116950", url: "https://bugzilla.suse.com/1116950", }, { category: "self", summary: "SUSE Bug 1117168", url: "https://bugzilla.suse.com/1117168", }, { category: "self", summary: "SUSE Bug 1117172", url: "https://bugzilla.suse.com/1117172", }, { category: "self", summary: "SUSE Bug 1117174", url: "https://bugzilla.suse.com/1117174", }, { category: "self", summary: "SUSE Bug 1117181", url: "https://bugzilla.suse.com/1117181", }, { category: "self", summary: "SUSE Bug 1117184", url: "https://bugzilla.suse.com/1117184", }, { category: "self", summary: "SUSE Bug 1117188", url: "https://bugzilla.suse.com/1117188", }, { category: "self", summary: "SUSE Bug 1117189", url: "https://bugzilla.suse.com/1117189", }, { category: "self", summary: "SUSE Bug 1117349", url: "https://bugzilla.suse.com/1117349", }, { category: "self", summary: "SUSE Bug 1117561", url: "https://bugzilla.suse.com/1117561", }, { category: "self", summary: "SUSE Bug 1117788", url: "https://bugzilla.suse.com/1117788", }, { category: "self", summary: "SUSE Bug 1117789", url: "https://bugzilla.suse.com/1117789", }, { category: "self", summary: "SUSE Bug 1117790", url: "https://bugzilla.suse.com/1117790", }, { category: "self", summary: "SUSE Bug 1117791", url: "https://bugzilla.suse.com/1117791", }, { category: "self", summary: "SUSE Bug 1117792", url: "https://bugzilla.suse.com/1117792", }, { category: "self", summary: "SUSE Bug 1117794", url: "https://bugzilla.suse.com/1117794", }, { category: "self", summary: "SUSE Bug 1117795", url: "https://bugzilla.suse.com/1117795", }, { category: "self", summary: "SUSE Bug 1117796", url: "https://bugzilla.suse.com/1117796", }, { category: "self", summary: "SUSE Bug 1117798", url: "https://bugzilla.suse.com/1117798", }, { category: "self", summary: "SUSE Bug 1117799", url: "https://bugzilla.suse.com/1117799", }, { category: "self", summary: "SUSE Bug 1117801", url: "https://bugzilla.suse.com/1117801", }, { category: "self", summary: "SUSE Bug 1117802", url: "https://bugzilla.suse.com/1117802", }, { category: "self", summary: "SUSE Bug 1117803", url: "https://bugzilla.suse.com/1117803", }, { category: "self", summary: "SUSE Bug 1117804", url: "https://bugzilla.suse.com/1117804", }, { category: "self", summary: "SUSE Bug 1117805", url: "https://bugzilla.suse.com/1117805", }, { category: "self", summary: "SUSE Bug 1117806", url: "https://bugzilla.suse.com/1117806", }, { category: "self", summary: "SUSE Bug 1117807", url: "https://bugzilla.suse.com/1117807", }, { category: "self", summary: "SUSE Bug 1117808", url: "https://bugzilla.suse.com/1117808", }, { category: "self", summary: "SUSE Bug 1117815", url: "https://bugzilla.suse.com/1117815", }, { category: "self", summary: "SUSE Bug 1117816", url: "https://bugzilla.suse.com/1117816", }, { category: "self", summary: "SUSE Bug 1117817", url: "https://bugzilla.suse.com/1117817", }, { category: "self", summary: "SUSE Bug 1117818", url: "https://bugzilla.suse.com/1117818", }, { category: "self", summary: "SUSE Bug 1117819", url: "https://bugzilla.suse.com/1117819", }, { category: "self", summary: "SUSE Bug 1117820", url: "https://bugzilla.suse.com/1117820", }, { category: "self", summary: "SUSE Bug 1117821", url: "https://bugzilla.suse.com/1117821", }, { category: "self", summary: "SUSE Bug 1117822", url: "https://bugzilla.suse.com/1117822", }, { category: "self", summary: "SUSE Bug 1118102", url: "https://bugzilla.suse.com/1118102", }, { category: "self", summary: "SUSE Bug 1118136", url: "https://bugzilla.suse.com/1118136", }, { category: "self", summary: "SUSE Bug 1118137", url: "https://bugzilla.suse.com/1118137", }, { category: "self", summary: "SUSE Bug 1118138", url: "https://bugzilla.suse.com/1118138", }, { category: "self", summary: "SUSE Bug 1118140", url: "https://bugzilla.suse.com/1118140", }, { category: "self", summary: "SUSE Bug 1118152", url: "https://bugzilla.suse.com/1118152", }, { category: "self", summary: "SUSE Bug 1118316", url: "https://bugzilla.suse.com/1118316", }, { category: "self", summary: "SUSE CVE CVE-2017-16533 page", url: "https://www.suse.com/security/cve/CVE-2017-16533/", }, { category: "self", summary: "SUSE CVE CVE-2017-18224 page", url: "https://www.suse.com/security/cve/CVE-2017-18224/", }, { category: "self", summary: "SUSE CVE CVE-2018-18281 page", url: "https://www.suse.com/security/cve/CVE-2018-18281/", }, { category: "self", summary: "SUSE CVE CVE-2018-18386 page", url: "https://www.suse.com/security/cve/CVE-2018-18386/", }, { category: "self", summary: "SUSE CVE CVE-2018-18445 page", url: "https://www.suse.com/security/cve/CVE-2018-18445/", }, { category: "self", summary: "SUSE CVE CVE-2018-18710 page", url: "https://www.suse.com/security/cve/CVE-2018-18710/", }, { category: "self", summary: "SUSE CVE CVE-2018-19824 page", url: "https://www.suse.com/security/cve/CVE-2018-19824/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2018-12-11T08:24:31Z", generator: { date: "2018-12-11T08:24:31Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:4069-1", initial_release_date: "2018-12-11T08:24:31Z", revision_history: [ { date: "2018-12-11T08:24:31Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-obs-build-4.12.14-95.3.2.aarch64", product: { name: "kernel-obs-build-4.12.14-95.3.2.aarch64", product_id: "kernel-obs-build-4.12.14-95.3.2.aarch64", }, }, { category: "product_version", name: "kernel-default-4.12.14-95.3.1.aarch64", product: { name: "kernel-default-4.12.14-95.3.1.aarch64", product_id: "kernel-default-4.12.14-95.3.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-95.3.1.aarch64", product: { name: "kernel-default-base-4.12.14-95.3.1.aarch64", product_id: "kernel-default-base-4.12.14-95.3.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-95.3.1.aarch64", product: { name: "kernel-default-devel-4.12.14-95.3.1.aarch64", product_id: "kernel-default-devel-4.12.14-95.3.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-95.3.1.aarch64", product: { name: "kernel-syms-4.12.14-95.3.1.aarch64", product_id: "kernel-syms-4.12.14-95.3.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-4.12.14-95.3.1.noarch", product: { name: "kernel-devel-4.12.14-95.3.1.noarch", product_id: "kernel-devel-4.12.14-95.3.1.noarch", }, }, { category: "product_version", name: "kernel-macros-4.12.14-95.3.1.noarch", product: { name: "kernel-macros-4.12.14-95.3.1.noarch", product_id: "kernel-macros-4.12.14-95.3.1.noarch", }, }, { category: "product_version", name: "kernel-source-4.12.14-95.3.1.noarch", product: { name: "kernel-source-4.12.14-95.3.1.noarch", product_id: "kernel-source-4.12.14-95.3.1.noarch", }, }, { category: "product_version", name: "kernel-docs-4.12.14-95.3.1.noarch", product: { name: "kernel-docs-4.12.14-95.3.1.noarch", product_id: "kernel-docs-4.12.14-95.3.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-95.3.1.ppc64le", product: { name: "cluster-md-kmp-default-4.12.14-95.3.1.ppc64le", product_id: "cluster-md-kmp-default-4.12.14-95.3.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-95.3.1.ppc64le", product: { name: "dlm-kmp-default-4.12.14-95.3.1.ppc64le", product_id: "dlm-kmp-default-4.12.14-95.3.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-95.3.1.ppc64le", product: { name: "gfs2-kmp-default-4.12.14-95.3.1.ppc64le", product_id: "gfs2-kmp-default-4.12.14-95.3.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-95.3.1.ppc64le", product: { name: "ocfs2-kmp-default-4.12.14-95.3.1.ppc64le", product_id: "ocfs2-kmp-default-4.12.14-95.3.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-95.3.2.ppc64le", product: { name: "kernel-obs-build-4.12.14-95.3.2.ppc64le", product_id: "kernel-obs-build-4.12.14-95.3.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-4.12.14-95.3.1.ppc64le", product: { name: "kernel-default-4.12.14-95.3.1.ppc64le", product_id: "kernel-default-4.12.14-95.3.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-95.3.1.ppc64le", product: { name: "kernel-default-base-4.12.14-95.3.1.ppc64le", product_id: "kernel-default-base-4.12.14-95.3.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-95.3.1.ppc64le", product: { name: "kernel-default-devel-4.12.14-95.3.1.ppc64le", product_id: "kernel-default-devel-4.12.14-95.3.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-4.12.14-95.3.1.ppc64le", product: { name: "kernel-syms-4.12.14-95.3.1.ppc64le", product_id: "kernel-syms-4.12.14-95.3.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-95.3.1.s390x", product: { name: "cluster-md-kmp-default-4.12.14-95.3.1.s390x", product_id: "cluster-md-kmp-default-4.12.14-95.3.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-95.3.1.s390x", product: { name: "dlm-kmp-default-4.12.14-95.3.1.s390x", product_id: "dlm-kmp-default-4.12.14-95.3.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-95.3.1.s390x", product: { name: "gfs2-kmp-default-4.12.14-95.3.1.s390x", product_id: "gfs2-kmp-default-4.12.14-95.3.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-95.3.1.s390x", product: { name: "ocfs2-kmp-default-4.12.14-95.3.1.s390x", product_id: "ocfs2-kmp-default-4.12.14-95.3.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-95.3.2.s390x", product: { name: "kernel-obs-build-4.12.14-95.3.2.s390x", product_id: "kernel-obs-build-4.12.14-95.3.2.s390x", }, }, { category: "product_version", name: "kernel-default-4.12.14-95.3.1.s390x", product: { name: "kernel-default-4.12.14-95.3.1.s390x", product_id: "kernel-default-4.12.14-95.3.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-95.3.1.s390x", product: { name: "kernel-default-base-4.12.14-95.3.1.s390x", product_id: "kernel-default-base-4.12.14-95.3.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-95.3.1.s390x", product: { name: "kernel-default-devel-4.12.14-95.3.1.s390x", product_id: "kernel-default-devel-4.12.14-95.3.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-4.12.14-95.3.1.s390x", product: { name: "kernel-default-man-4.12.14-95.3.1.s390x", product_id: "kernel-default-man-4.12.14-95.3.1.s390x", }, }, { category: "product_version", name: "kernel-syms-4.12.14-95.3.1.s390x", product: { name: "kernel-syms-4.12.14-95.3.1.s390x", product_id: "kernel-syms-4.12.14-95.3.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "kernel-default-4.12.14-95.3.1.x86_64", product: { name: "kernel-default-4.12.14-95.3.1.x86_64", product_id: "kernel-default-4.12.14-95.3.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-95.3.1.x86_64", product: { name: "kernel-default-devel-4.12.14-95.3.1.x86_64", product_id: "kernel-default-devel-4.12.14-95.3.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-95.3.1.x86_64", product: { name: "kernel-default-extra-4.12.14-95.3.1.x86_64", product_id: "kernel-default-extra-4.12.14-95.3.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-95.3.1.x86_64", product: { name: "kernel-syms-4.12.14-95.3.1.x86_64", product_id: "kernel-syms-4.12.14-95.3.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-default-4.12.14-95.3.1.x86_64", product: { name: "cluster-md-kmp-default-4.12.14-95.3.1.x86_64", product_id: "cluster-md-kmp-default-4.12.14-95.3.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-95.3.1.x86_64", product: { name: "dlm-kmp-default-4.12.14-95.3.1.x86_64", product_id: "dlm-kmp-default-4.12.14-95.3.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-95.3.1.x86_64", product: { name: "gfs2-kmp-default-4.12.14-95.3.1.x86_64", product_id: "gfs2-kmp-default-4.12.14-95.3.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-95.3.1.x86_64", product: { name: "ocfs2-kmp-default-4.12.14-95.3.1.x86_64", product_id: "ocfs2-kmp-default-4.12.14-95.3.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-95.3.2.x86_64", product: { name: "kernel-obs-build-4.12.14-95.3.2.x86_64", product_id: "kernel-obs-build-4.12.14-95.3.2.x86_64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-95.3.1.x86_64", product: { name: "kernel-default-base-4.12.14-95.3.1.x86_64", product_id: "kernel-default-base-4.12.14-95.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Desktop 12 SP4", product: { name: "SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sled:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 12 SP4", product: { name: "SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP4", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP4", product: { name: "SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 12 SP4", product: { name: "SUSE Linux Enterprise Workstation Extension 12 SP4", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:12:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", }, product_reference: "kernel-default-4.12.14-95.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-95.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-4.12.14-95.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", }, product_reference: "kernel-default-extra-4.12.14-95.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-95.3.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", }, product_reference: "kernel-devel-4.12.14-95.3.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-95.3.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", }, product_reference: "kernel-macros-4.12.14-95.3.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-95.3.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.3.1.noarch", }, product_reference: "kernel-source-4.12.14-95.3.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", }, product_reference: "kernel-syms-4.12.14-95.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-95.3.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.ppc64le", }, product_reference: "cluster-md-kmp-default-4.12.14-95.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-95.3.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.s390x", }, product_reference: "cluster-md-kmp-default-4.12.14-95.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-95.3.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.x86_64", }, product_reference: "cluster-md-kmp-default-4.12.14-95.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-95.3.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.ppc64le", }, product_reference: "dlm-kmp-default-4.12.14-95.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-95.3.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.s390x", }, product_reference: "dlm-kmp-default-4.12.14-95.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-95.3.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.x86_64", }, product_reference: "dlm-kmp-default-4.12.14-95.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-95.3.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.ppc64le", }, product_reference: "gfs2-kmp-default-4.12.14-95.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-95.3.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.s390x", }, product_reference: "gfs2-kmp-default-4.12.14-95.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-95.3.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.x86_64", }, product_reference: "gfs2-kmp-default-4.12.14-95.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-95.3.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.ppc64le", }, product_reference: "ocfs2-kmp-default-4.12.14-95.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-95.3.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.s390x", }, product_reference: "ocfs2-kmp-default-4.12.14-95.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-95.3.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.x86_64", }, product_reference: "ocfs2-kmp-default-4.12.14-95.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-95.3.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.3.1.noarch", }, product_reference: "kernel-docs-4.12.14-95.3.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-95.3.2.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.aarch64", }, product_reference: "kernel-obs-build-4.12.14-95.3.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-95.3.2.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.ppc64le", }, product_reference: "kernel-obs-build-4.12.14-95.3.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-95.3.2.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.s390x", }, product_reference: "kernel-obs-build-4.12.14-95.3.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-95.3.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.x86_64", }, product_reference: "kernel-obs-build-4.12.14-95.3.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", }, product_reference: "kernel-default-4.12.14-95.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", }, product_reference: "kernel-default-4.12.14-95.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.s390x", }, product_reference: "kernel-default-4.12.14-95.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", }, product_reference: "kernel-default-4.12.14-95.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", }, product_reference: "kernel-default-base-4.12.14-95.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", }, product_reference: "kernel-default-base-4.12.14-95.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", }, product_reference: "kernel-default-base-4.12.14-95.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-95.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", }, product_reference: "kernel-default-devel-4.12.14-95.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-95.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", }, product_reference: "kernel-default-devel-4.12.14-95.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-95.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.12.14-95.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", }, product_reference: "kernel-default-man-4.12.14-95.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-95.3.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", }, product_reference: "kernel-devel-4.12.14-95.3.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-95.3.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", }, product_reference: "kernel-macros-4.12.14-95.3.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-95.3.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.3.1.noarch", }, product_reference: "kernel-source-4.12.14-95.3.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", }, product_reference: "kernel-syms-4.12.14-95.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", }, product_reference: "kernel-syms-4.12.14-95.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", }, product_reference: "kernel-syms-4.12.14-95.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", }, product_reference: "kernel-syms-4.12.14-95.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", }, product_reference: "kernel-default-4.12.14-95.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", }, product_reference: "kernel-default-4.12.14-95.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.s390x", }, product_reference: "kernel-default-4.12.14-95.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", }, product_reference: "kernel-default-4.12.14-95.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", }, product_reference: "kernel-default-base-4.12.14-95.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", }, product_reference: "kernel-default-base-4.12.14-95.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", }, product_reference: "kernel-default-base-4.12.14-95.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-95.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", }, product_reference: "kernel-default-devel-4.12.14-95.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-95.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", }, product_reference: "kernel-default-devel-4.12.14-95.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-95.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.12.14-95.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", }, product_reference: "kernel-default-man-4.12.14-95.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-95.3.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", }, product_reference: "kernel-devel-4.12.14-95.3.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-95.3.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", }, product_reference: "kernel-macros-4.12.14-95.3.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-95.3.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.3.1.noarch", }, product_reference: "kernel-source-4.12.14-95.3.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", }, product_reference: "kernel-syms-4.12.14-95.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", }, product_reference: "kernel-syms-4.12.14-95.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", }, product_reference: "kernel-syms-4.12.14-95.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", }, product_reference: "kernel-syms-4.12.14-95.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-4.12.14-95.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP4", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", }, product_reference: "kernel-default-extra-4.12.14-95.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 12 SP4", }, ], }, vulnerabilities: [ { cve: "CVE-2017-16533", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16533", }, ], notes: [ { category: "general", text: "The usbhid_parse function in drivers/hid/usbhid/hid-core.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16533", url: "https://www.suse.com/security/cve/CVE-2017-16533", }, { category: "external", summary: "SUSE Bug 1066674 for CVE-2017-16533", url: "https://bugzilla.suse.com/1066674", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2017-16533", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2017-16533", url: "https://bugzilla.suse.com/1146519", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-12-11T08:24:31Z", details: "moderate", }, ], title: "CVE-2017-16533", }, { cve: "CVE-2017-18224", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-18224", }, ], notes: [ { category: "general", text: "In the Linux kernel before 4.15, fs/ocfs2/aops.c omits use of a semaphore and consequently has a race condition for access to the extent tree during read operations in DIRECT mode, which allows local users to cause a denial of service (BUG) by modifying a certain e_cpos field.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-18224", url: "https://www.suse.com/security/cve/CVE-2017-18224", }, { category: "external", summary: "SUSE Bug 1084831 for CVE-2017-18224", url: "https://bugzilla.suse.com/1084831", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-12-11T08:24:31Z", details: "moderate", }, ], title: "CVE-2017-18224", }, { cve: "CVE-2018-18281", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18281", }, ], notes: [ { category: "general", text: "Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. This is fixed in the following kernel versions: 4.9.135, 4.14.78, 4.18.16, 4.19.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18281", url: "https://www.suse.com/security/cve/CVE-2018-18281", }, { category: "external", summary: "SUSE Bug 1113769 for CVE-2018-18281", url: "https://bugzilla.suse.com/1113769", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-12-11T08:24:31Z", details: "moderate", }, ], title: "CVE-2018-18281", }, { cve: "CVE-2018-18386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18386", }, ], notes: [ { category: "general", text: "drivers/tty/n_tty.c in the Linux kernel before 4.14.11 allows local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18386", url: "https://www.suse.com/security/cve/CVE-2018-18386", }, { category: "external", summary: "SUSE Bug 1094825 for CVE-2018-18386", url: "https://bugzilla.suse.com/1094825", }, { category: "external", summary: "SUSE Bug 1112039 for CVE-2018-18386", url: "https://bugzilla.suse.com/1112039", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-12-11T08:24:31Z", details: "moderate", }, ], title: "CVE-2018-18386", }, { cve: "CVE-2018-18445", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18445", }, ], notes: [ { category: "general", text: "In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18445", url: "https://www.suse.com/security/cve/CVE-2018-18445", }, { category: "external", summary: "SUSE Bug 1112372 for CVE-2018-18445", url: "https://bugzilla.suse.com/1112372", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-12-11T08:24:31Z", details: "low", }, ], title: "CVE-2018-18445", }, { cve: "CVE-2018-18710", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18710", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18710", url: "https://www.suse.com/security/cve/CVE-2018-18710", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-18710", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-12-11T08:24:31Z", details: "moderate", }, ], title: "CVE-2018-18710", }, { cve: "CVE-2018-19824", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19824", }, ], notes: [ { category: "general", text: "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19824", url: "https://www.suse.com/security/cve/CVE-2018-19824", }, { category: "external", summary: "SUSE Bug 1118152 for CVE-2018-19824", url: "https://bugzilla.suse.com/1118152", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.3.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.3.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-12-11T08:24:31Z", details: "moderate", }, ], title: "CVE-2018-19824", }, ], }
suse-su-2018:3869-1
Vulnerability from csaf_suse
Published
2018-11-22 15:24
Modified
2018-11-22 15:24
Summary
Security update for the Linux RT Kernel
Notes
Title of the patch
Security update for the Linux RT Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 RT kernel was updated to 3.0.101-rt130-69.39 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-18281: An issue was discovered in the Linux kernel, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused (bnc#1113769).
- CVE-2018-18710: An issue was discovered in the Linux kernel, an information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).
- CVE-2018-18386: drivers/tty/n_tty.c in the Linux kernel allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).
- CVE-2017-7273: The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 4.x allowed physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report (bnc#1031240).
- CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674).
- CVE-2017-1000407: An denial of service issue was discovered in the Linux kernel, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic (bnc#1071021).
- CVE-2018-9516: An issue was discovered in the Linux kernel, the copy_to_user() inside the HID code does not correctly check the length before executing (bsc#1108498).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely (bnc#1107829).
The following non-security bugs were fixed:
- Btrfs: fix deadlock when finalizing block group creation (bsc#1107849).
- Btrfs: fix quick exhaustion of the system array in the superblock (bsc#1107849).
- FS-Cache: Synchronise object death state change vs operation submission (bsc#1107371).
- KABI: move the new handler to end of machdep_calls and hide it from genksyms (bsc#1094244).
- KVM: Disable irq while unregistering user notifier (bsc#1106240).
- KVM: SVM: obey guest PAT (bsc#1106240).
- KVM: VMX: remove I/O port 0x80 bypass on Intel hosts (bsc#1106240).
- KVM: emulate: fix CMPXCHG8B on 32-bit hosts (bsc#1106240).
- KVM: x86: emulator: Return to user-mode on L1 CPL=0 emulation failure (bsc#1106240).
- KVM: x86: fix use of uninitialized memory as segment descriptor in emulator (bsc#1106240).
- KVM: x86: zero base3 of unusable segments (bsc#1106240).
- NFS - do not hang if xdr decoded username is bad (bsc#1105799).
- NFSv4.1 - Do not leak IO size from one mount to another (bsc#1103145).
- PCI/AER: Report non-fatal errors only to the affected endpoint (bsc#1109806).
- PCI: Supply CPU physical address (not bus address) to iomem_is_exclusive() (bsc#1109806).
- PCI: shpchp: Check bridge's secondary (not primary) bus speed (bsc#1109806).
- PCI: shpchp: Fix AMD POGO identification (bsc#1109806).
- add kernel parameter to disable failfast on block devices (bsc#1081680).
- block: add flag QUEUE_FLAG_REGISTERED (bsc#1047027).
- block: allow gendisk's request_queue registration to be deferred (bsc#1047027).
- crypto: ghash-clmulni-intel - use C implementation for setkey() (bsc#1110006).
- dm: fix incomplete request_queue initialization (bsc#1047027).
- dm: only initialize the request_queue once (bsc#1047027).
- firmware/ihex2fw.c: restore missing default in switch statement (bsc#1114460).
- kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE (git-fixes).
- locks: fix unlock when fcntl_setlk races with a close (git-fixes).
- media: Fix invalid free in the fix for mceusb (bsc#1050431).
- media: cx25821: prevent out-of-bounds read on array card (bsc#1050431).
- media: ite-cir: initialize use_demodulator before using it (bsc#1050431).
- media: mceusb: fix NULL-deref at probe (bsc#1050431).
- media: mceusb: fix memory leaks in error path.
- percpu: make pcpu_alloc_chunk() use pcpu_mem_free() instead of kfree() (git fixes).
- powerpc, KVM: Rework KVM checks in first-level interrupt handlers (bsc#1094244).
- powerpc/64: Do load of PACAKBASE in LOAD_HANDLER (bsc#1094244).
- powerpc/64: Fix smp_wmb barrier definition use use lwsync consistently (bsc#1064861).
- powerpc/64: Initialise thread_info for emergency stacks (bsc#1094244).
- powerpc/64s: Exception macro for stack frame and initial register save (bsc#1094244).
- powerpc/64s: move machine check SLB flushing to mm/slb.c (bsc#1094244).
- powerpc/asm: Mark cr0 as clobbered in mftb() (bsc#1049128).
- powerpc/book3s: Introduce a early machine check hook in cpu_spec (bsc#1094244).
- powerpc/book3s: Introduce exclusive emergency stack for machine check exception (bsc#1094244).
- powerpc/book3s: Split the common exception prolog logic into two section (bsc#1094244).
- powerpc/book3s: handle machine check in Linux host (bsc#1094244).
- powerpc/mce: Fix SLB rebolting during MCE recovery path (bsc#1094244).
- powerpc/pseries: Avoid using the size greater than (bsc#1094244).
- powerpc/pseries: Defer the logging of rtas error to irq work queue (bsc#1094244).
- powerpc/pseries: Dump the SLB contents on SLB MCE errors (bsc#1094244).
- powerpc/pseries: Flush SLB contents on SLB MCE errors (bsc#1094244).
- powerpc: Add a symbol for hypervisor trampolines (bsc#1094244).
- powerpc: Fix smp_mb__before_spinlock() (bsc#1110247).
- powerpc: Make load_hander handle upto 64k offset (bsc#1094244).
- powerpc: Rework runlatch code (bsc#1094244).
- powerpc: Save CFAR before branching in interrupt entry paths (bsc#1094244).
- powerpc: cputable: KABI - hide new cpu_spec member from genksyms (bsc#1094244).
- powerpc: move MCE handler out-of-line and consolidate with machine_check_fwnmi (bsc#1094244).
- powerpc: move stab code into #ifndef CONFIG_POWER4_ONLY (bsc#1094244).
- powerpc: replace open-coded EXCEPTION_PROLOG_1 with the macro in slb miss handlers (bsc#1094244).
- reiserfs: add check to detect corrupted directory entry (bsc#1109818).
- reiserfs: do not panic on bad directory entries (bsc#1109818).
- retpoline: Introduce start/end markers of indirect thunk (bsc#1113337).
- s390/facilites: use stfle_fac_list array size for MAX_FACILITY_BIT (bnc#1108314, LTC#171326).
- s390/sclp: Change SCLP console default buffer-full behavior (bnc#1108314, LTC#171049).
- scsi: libfc: Do not drop down to FLOGI for fc_rport_login() (bsc#1106139).
- scsi: libfc: Do not login if the port is already started (bsc#1106139).
- scsi: libfc: do not advance state machine for incoming FLOGI (bsc#1106139).
- scsi: storvsc: fix memory leak on ring buffer busy (bnc#923775).
- signals: avoid unnecessary taking of sighand->siglock (bsc#1110247).
- x86/kexec: Avoid double free_page() upon do_kexec_load() failure (bsc#1110006).
- x86/mm/32: Set the '__vmalloc_start_set' flag in initmem_init() (bsc#1110006).
- x86/paravirt: Fix some warning messages (bnc#1065600).
- x86/percpu: Fix this_cpu_read() (bsc#1110006).
- x86/process: Re-export start_thread() (bsc#1110006).
- x86/vdso: Fix asm constraints on vDSO syscall fallbacks (bsc#1110006).
Patchnames
slertesp4-kernel-source-rt-13876
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux RT Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 11 SP4 RT kernel was updated to 3.0.101-rt130-69.39 to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-18281: An issue was discovered in the Linux kernel, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused (bnc#1113769).\n- CVE-2018-18710: An issue was discovered in the Linux kernel, an information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).\n- CVE-2018-18386: drivers/tty/n_tty.c in the Linux kernel allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).\n- CVE-2017-7273: The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 4.x allowed physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report (bnc#1031240).\n- CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674).\n- CVE-2017-1000407: An denial of service issue was discovered in the Linux kernel, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic (bnc#1071021).\n- CVE-2018-9516: An issue was discovered in the Linux kernel, the copy_to_user() inside the HID code does not correctly check the length before executing (bsc#1108498).\n- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely (bnc#1107829).\n\nThe following non-security bugs were fixed:\n\n- Btrfs: fix deadlock when finalizing block group creation (bsc#1107849).\n- Btrfs: fix quick exhaustion of the system array in the superblock (bsc#1107849).\n- FS-Cache: Synchronise object death state change vs operation submission (bsc#1107371).\n- KABI: move the new handler to end of machdep_calls and hide it from genksyms (bsc#1094244).\n- KVM: Disable irq while unregistering user notifier (bsc#1106240).\n- KVM: SVM: obey guest PAT (bsc#1106240).\n- KVM: VMX: remove I/O port 0x80 bypass on Intel hosts (bsc#1106240).\n- KVM: emulate: fix CMPXCHG8B on 32-bit hosts (bsc#1106240).\n- KVM: x86: emulator: Return to user-mode on L1 CPL=0 emulation failure (bsc#1106240).\n- KVM: x86: fix use of uninitialized memory as segment descriptor in emulator (bsc#1106240).\n- KVM: x86: zero base3 of unusable segments (bsc#1106240).\n- NFS - do not hang if xdr decoded username is bad (bsc#1105799).\n- NFSv4.1 - Do not leak IO size from one mount to another (bsc#1103145).\n- PCI/AER: Report non-fatal errors only to the affected endpoint (bsc#1109806).\n- PCI: Supply CPU physical address (not bus address) to iomem_is_exclusive() (bsc#1109806).\n- PCI: shpchp: Check bridge's secondary (not primary) bus speed (bsc#1109806).\n- PCI: shpchp: Fix AMD POGO identification (bsc#1109806).\n- add kernel parameter to disable failfast on block devices (bsc#1081680).\n- block: add flag QUEUE_FLAG_REGISTERED (bsc#1047027).\n- block: allow gendisk's request_queue registration to be deferred (bsc#1047027).\n- crypto: ghash-clmulni-intel - use C implementation for setkey() (bsc#1110006).\n- dm: fix incomplete request_queue initialization (bsc#1047027).\n- dm: only initialize the request_queue once (bsc#1047027).\n- firmware/ihex2fw.c: restore missing default in switch statement (bsc#1114460).\n- kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE (git-fixes).\n- locks: fix unlock when fcntl_setlk races with a close (git-fixes).\n- media: Fix invalid free in the fix for mceusb (bsc#1050431).\n- media: cx25821: prevent out-of-bounds read on array card (bsc#1050431).\n- media: ite-cir: initialize use_demodulator before using it (bsc#1050431).\n- media: mceusb: fix NULL-deref at probe (bsc#1050431).\n- media: mceusb: fix memory leaks in error path.\n- percpu: make pcpu_alloc_chunk() use pcpu_mem_free() instead of kfree() (git fixes).\n- powerpc, KVM: Rework KVM checks in first-level interrupt handlers (bsc#1094244).\n- powerpc/64: Do load of PACAKBASE in LOAD_HANDLER (bsc#1094244).\n- powerpc/64: Fix smp_wmb barrier definition use use lwsync consistently (bsc#1064861).\n- powerpc/64: Initialise thread_info for emergency stacks (bsc#1094244).\n- powerpc/64s: Exception macro for stack frame and initial register save (bsc#1094244).\n- powerpc/64s: move machine check SLB flushing to mm/slb.c (bsc#1094244).\n- powerpc/asm: Mark cr0 as clobbered in mftb() (bsc#1049128).\n- powerpc/book3s: Introduce a early machine check hook in cpu_spec (bsc#1094244).\n- powerpc/book3s: Introduce exclusive emergency stack for machine check exception (bsc#1094244).\n- powerpc/book3s: Split the common exception prolog logic into two section (bsc#1094244).\n- powerpc/book3s: handle machine check in Linux host (bsc#1094244).\n- powerpc/mce: Fix SLB rebolting during MCE recovery path (bsc#1094244).\n- powerpc/pseries: Avoid using the size greater than (bsc#1094244).\n- powerpc/pseries: Defer the logging of rtas error to irq work queue (bsc#1094244).\n- powerpc/pseries: Dump the SLB contents on SLB MCE errors (bsc#1094244).\n- powerpc/pseries: Flush SLB contents on SLB MCE errors (bsc#1094244).\n- powerpc: Add a symbol for hypervisor trampolines (bsc#1094244).\n- powerpc: Fix smp_mb__before_spinlock() (bsc#1110247).\n- powerpc: Make load_hander handle upto 64k offset (bsc#1094244).\n- powerpc: Rework runlatch code (bsc#1094244).\n- powerpc: Save CFAR before branching in interrupt entry paths (bsc#1094244).\n- powerpc: cputable: KABI - hide new cpu_spec member from genksyms (bsc#1094244).\n- powerpc: move MCE handler out-of-line and consolidate with machine_check_fwnmi (bsc#1094244).\n- powerpc: move stab code into #ifndef CONFIG_POWER4_ONLY (bsc#1094244).\n- powerpc: replace open-coded EXCEPTION_PROLOG_1 with the macro in slb miss handlers (bsc#1094244).\n- reiserfs: add check to detect corrupted directory entry (bsc#1109818).\n- reiserfs: do not panic on bad directory entries (bsc#1109818).\n- retpoline: Introduce start/end markers of indirect thunk (bsc#1113337).\n- s390/facilites: use stfle_fac_list array size for MAX_FACILITY_BIT (bnc#1108314, LTC#171326).\n- s390/sclp: Change SCLP console default buffer-full behavior (bnc#1108314, LTC#171049).\n- scsi: libfc: Do not drop down to FLOGI for fc_rport_login() (bsc#1106139).\n- scsi: libfc: Do not login if the port is already started (bsc#1106139).\n- scsi: libfc: do not advance state machine for incoming FLOGI (bsc#1106139).\n- scsi: storvsc: fix memory leak on ring buffer busy (bnc#923775).\n- signals: avoid unnecessary taking of sighand->siglock (bsc#1110247).\n- x86/kexec: Avoid double free_page() upon do_kexec_load() failure (bsc#1110006).\n- x86/mm/32: Set the '__vmalloc_start_set' flag in initmem_init() (bsc#1110006).\n- x86/paravirt: Fix some warning messages (bnc#1065600).\n- x86/percpu: Fix this_cpu_read() (bsc#1110006).\n- x86/process: Re-export start_thread() (bsc#1110006).\n- x86/vdso: Fix asm constraints on vDSO syscall fallbacks (bsc#1110006).\n", title: "Description of the patch", }, { category: "details", text: "slertesp4-kernel-source-rt-13876", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3869-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:3869-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183869-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:3869-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-November/004878.html", }, { category: "self", summary: "SUSE Bug 1031240", url: "https://bugzilla.suse.com/1031240", }, { category: "self", summary: "SUSE Bug 1047027", url: "https://bugzilla.suse.com/1047027", }, { category: "self", summary: "SUSE Bug 1049128", url: "https://bugzilla.suse.com/1049128", }, { category: "self", summary: "SUSE Bug 1050431", url: "https://bugzilla.suse.com/1050431", }, { category: "self", summary: "SUSE Bug 1064861", url: "https://bugzilla.suse.com/1064861", }, { category: "self", summary: "SUSE Bug 1065600", url: "https://bugzilla.suse.com/1065600", }, { category: "self", summary: "SUSE Bug 1066674", url: "https://bugzilla.suse.com/1066674", }, { category: "self", summary: "SUSE Bug 1071021", url: "https://bugzilla.suse.com/1071021", }, { category: "self", summary: "SUSE Bug 1081680", url: "https://bugzilla.suse.com/1081680", }, { category: "self", summary: "SUSE Bug 1094244", url: "https://bugzilla.suse.com/1094244", }, { category: "self", summary: "SUSE Bug 1094825", url: "https://bugzilla.suse.com/1094825", }, { category: "self", summary: "SUSE Bug 1103145", url: "https://bugzilla.suse.com/1103145", }, { category: "self", summary: "SUSE Bug 1105799", url: "https://bugzilla.suse.com/1105799", }, { category: "self", summary: "SUSE Bug 1106139", url: "https://bugzilla.suse.com/1106139", }, { category: "self", summary: "SUSE Bug 1106240", url: "https://bugzilla.suse.com/1106240", }, { category: "self", summary: "SUSE Bug 1107371", url: "https://bugzilla.suse.com/1107371", }, { category: "self", summary: "SUSE Bug 1107829", url: "https://bugzilla.suse.com/1107829", }, { category: "self", summary: "SUSE Bug 1107849", url: "https://bugzilla.suse.com/1107849", }, { category: "self", summary: "SUSE Bug 1108314", url: "https://bugzilla.suse.com/1108314", }, { category: "self", summary: "SUSE Bug 1108498", url: "https://bugzilla.suse.com/1108498", }, { category: "self", summary: "SUSE Bug 1109806", url: "https://bugzilla.suse.com/1109806", }, { category: "self", summary: "SUSE Bug 1109818", url: "https://bugzilla.suse.com/1109818", }, { category: "self", summary: "SUSE Bug 1110006", url: "https://bugzilla.suse.com/1110006", }, { category: "self", summary: "SUSE Bug 1110247", url: "https://bugzilla.suse.com/1110247", }, { category: "self", summary: "SUSE Bug 1113337", url: "https://bugzilla.suse.com/1113337", }, { category: "self", summary: "SUSE Bug 1113751", url: "https://bugzilla.suse.com/1113751", }, { category: "self", summary: "SUSE Bug 1113769", url: "https://bugzilla.suse.com/1113769", }, { category: "self", summary: "SUSE Bug 1114460", url: "https://bugzilla.suse.com/1114460", }, { category: "self", summary: "SUSE Bug 923775", url: "https://bugzilla.suse.com/923775", }, { category: "self", summary: "SUSE CVE CVE-2017-1000407 page", url: "https://www.suse.com/security/cve/CVE-2017-1000407/", }, { category: "self", summary: "SUSE CVE CVE-2017-16533 page", url: "https://www.suse.com/security/cve/CVE-2017-16533/", }, { category: "self", summary: "SUSE CVE CVE-2017-7273 page", url: "https://www.suse.com/security/cve/CVE-2017-7273/", }, { category: "self", summary: "SUSE CVE CVE-2018-14633 page", url: "https://www.suse.com/security/cve/CVE-2018-14633/", }, { category: "self", summary: "SUSE CVE CVE-2018-18281 page", url: "https://www.suse.com/security/cve/CVE-2018-18281/", }, { category: "self", summary: "SUSE CVE CVE-2018-18386 page", url: "https://www.suse.com/security/cve/CVE-2018-18386/", }, { category: "self", summary: "SUSE CVE CVE-2018-18710 page", url: "https://www.suse.com/security/cve/CVE-2018-18710/", }, { category: "self", summary: "SUSE CVE CVE-2018-9516 page", url: "https://www.suse.com/security/cve/CVE-2018-9516/", }, ], title: "Security update for the Linux RT Kernel", tracking: { current_release_date: "2018-11-22T15:24:25Z", generator: { date: "2018-11-22T15:24:25Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:3869-1", initial_release_date: "2018-11-22T15:24:25Z", revision_history: [ { date: "2018-11-22T15:24:25Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-rt-3.0.101.rt130-69.39.1.x86_64", product: { name: "kernel-rt-3.0.101.rt130-69.39.1.x86_64", product_id: "kernel-rt-3.0.101.rt130-69.39.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-base-3.0.101.rt130-69.39.1.x86_64", product: { name: "kernel-rt-base-3.0.101.rt130-69.39.1.x86_64", product_id: "kernel-rt-base-3.0.101.rt130-69.39.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-devel-3.0.101.rt130-69.39.1.x86_64", product: { name: "kernel-rt-devel-3.0.101.rt130-69.39.1.x86_64", product_id: "kernel-rt-devel-3.0.101.rt130-69.39.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_trace-3.0.101.rt130-69.39.1.x86_64", product: { name: "kernel-rt_trace-3.0.101.rt130-69.39.1.x86_64", product_id: "kernel-rt_trace-3.0.101.rt130-69.39.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_trace-base-3.0.101.rt130-69.39.1.x86_64", product: { name: "kernel-rt_trace-base-3.0.101.rt130-69.39.1.x86_64", product_id: "kernel-rt_trace-base-3.0.101.rt130-69.39.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_trace-devel-3.0.101.rt130-69.39.1.x86_64", product: { name: "kernel-rt_trace-devel-3.0.101.rt130-69.39.1.x86_64", product_id: "kernel-rt_trace-devel-3.0.101.rt130-69.39.1.x86_64", }, }, { category: "product_version", name: "kernel-source-rt-3.0.101.rt130-69.39.1.x86_64", product: { name: "kernel-source-rt-3.0.101.rt130-69.39.1.x86_64", product_id: "kernel-source-rt-3.0.101.rt130-69.39.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-rt-3.0.101.rt130-69.39.1.x86_64", product: { name: "kernel-syms-rt-3.0.101.rt130-69.39.1.x86_64", product_id: "kernel-syms-rt-3.0.101.rt130-69.39.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Real Time 11 SP4", product: { name: "SUSE Linux Enterprise Real Time 11 SP4", product_id: "SUSE Linux Enterprise Real Time 11 SP4", product_identification_helper: { cpe: "cpe:/a:suse:suse-linux-enterprise-rt:11:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-rt-3.0.101.rt130-69.39.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", product_id: "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.39.1.x86_64", }, product_reference: "kernel-rt-3.0.101.rt130-69.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-base-3.0.101.rt130-69.39.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", product_id: "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.39.1.x86_64", }, product_reference: "kernel-rt-base-3.0.101.rt130-69.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-3.0.101.rt130-69.39.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", product_id: "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.39.1.x86_64", }, product_reference: "kernel-rt-devel-3.0.101.rt130-69.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_trace-3.0.101.rt130-69.39.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", product_id: "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.39.1.x86_64", }, product_reference: "kernel-rt_trace-3.0.101.rt130-69.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_trace-base-3.0.101.rt130-69.39.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", product_id: "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.39.1.x86_64", }, product_reference: "kernel-rt_trace-base-3.0.101.rt130-69.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_trace-devel-3.0.101.rt130-69.39.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", product_id: "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.39.1.x86_64", }, product_reference: "kernel-rt_trace-devel-3.0.101.rt130-69.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-3.0.101.rt130-69.39.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", product_id: "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.39.1.x86_64", }, product_reference: "kernel-source-rt-3.0.101.rt130-69.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-3.0.101.rt130-69.39.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", product_id: "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.39.1.x86_64", }, product_reference: "kernel-syms-rt-3.0.101.rt130-69.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 11 SP4", }, ], }, vulnerabilities: [ { cve: "CVE-2017-1000407", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000407", }, ], notes: [ { category: "general", text: "The Linux Kernel 2.6.32 and later are affected by a denial of service, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000407", url: "https://www.suse.com/security/cve/CVE-2017-1000407", }, { category: "external", summary: "SUSE Bug 1071021 for CVE-2017-1000407", url: "https://bugzilla.suse.com/1071021", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-22T15:24:25Z", details: "moderate", }, ], title: "CVE-2017-1000407", }, { cve: "CVE-2017-16533", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16533", }, ], notes: [ { category: "general", text: "The usbhid_parse function in drivers/hid/usbhid/hid-core.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16533", url: "https://www.suse.com/security/cve/CVE-2017-16533", }, { category: "external", summary: "SUSE Bug 1066674 for CVE-2017-16533", url: "https://bugzilla.suse.com/1066674", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2017-16533", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2017-16533", url: "https://bugzilla.suse.com/1146519", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-22T15:24:25Z", details: "moderate", }, ], title: "CVE-2017-16533", }, { cve: "CVE-2017-7273", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7273", }, ], notes: [ { category: "general", text: "The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 3.2 and 4.x before 4.9.4 allows physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7273", url: "https://www.suse.com/security/cve/CVE-2017-7273", }, { category: "external", summary: "SUSE Bug 1031240 for CVE-2017-7273", url: "https://bugzilla.suse.com/1031240", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-22T15:24:25Z", details: "moderate", }, ], title: "CVE-2017-7273", }, { cve: "CVE-2018-14633", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14633", }, ], notes: [ { category: "general", text: "A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14633", url: "https://www.suse.com/security/cve/CVE-2018-14633", }, { category: "external", summary: "SUSE Bug 1107829 for CVE-2018-14633", url: "https://bugzilla.suse.com/1107829", }, { category: "external", summary: "SUSE Bug 1107832 for CVE-2018-14633", url: "https://bugzilla.suse.com/1107832", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-22T15:24:25Z", details: "important", }, ], title: "CVE-2018-14633", }, { cve: "CVE-2018-18281", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18281", }, ], notes: [ { category: "general", text: "Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. This is fixed in the following kernel versions: 4.9.135, 4.14.78, 4.18.16, 4.19.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18281", url: "https://www.suse.com/security/cve/CVE-2018-18281", }, { category: "external", summary: "SUSE Bug 1113769 for CVE-2018-18281", url: "https://bugzilla.suse.com/1113769", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-22T15:24:25Z", details: "moderate", }, ], title: "CVE-2018-18281", }, { cve: "CVE-2018-18386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18386", }, ], notes: [ { category: "general", text: "drivers/tty/n_tty.c in the Linux kernel before 4.14.11 allows local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18386", url: "https://www.suse.com/security/cve/CVE-2018-18386", }, { category: "external", summary: "SUSE Bug 1094825 for CVE-2018-18386", url: "https://bugzilla.suse.com/1094825", }, { category: "external", summary: "SUSE Bug 1112039 for CVE-2018-18386", url: "https://bugzilla.suse.com/1112039", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-22T15:24:25Z", details: "moderate", }, ], title: "CVE-2018-18386", }, { cve: "CVE-2018-18710", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18710", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18710", url: "https://www.suse.com/security/cve/CVE-2018-18710", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-18710", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-22T15:24:25Z", details: "moderate", }, ], title: "CVE-2018-18710", }, { cve: "CVE-2018-9516", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-9516", }, ], notes: [ { category: "general", text: "In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-71361580.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-9516", url: "https://www.suse.com/security/cve/CVE-2018-9516", }, { category: "external", summary: "SUSE Bug 1108498 for CVE-2018-9516", url: "https://bugzilla.suse.com/1108498", }, { category: "external", summary: "SUSE Bug 1123161 for CVE-2018-9516", url: "https://bugzilla.suse.com/1123161", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.39.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-22T15:24:25Z", details: "moderate", }, ], title: "CVE-2018-9516", }, ], }
suse-su-2018:3689-1
Vulnerability from csaf_suse
Published
2018-11-09 16:00
Modified
2018-11-09 16:00
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.162 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bnc#1107829).
- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).
- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).
- CVE-2018-18690: A local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE operations with conversion of an attr from short to long form (bnc#1105025).
- CVE-2018-18710: An issue was discovered in the Linux kernel An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).
- CVE-2018-9516: A lack of certain checks in the hid_debug_events_read() function in the drivers/hid/hid-debug.c file might have resulted in receiving userspace buffer overflow and an out-of-bounds write or to the infinite loop. (bnc#1108498).
The following non-security bugs were fixed:
- 6lowpan: iphc: reset mac_header after decompress to fix panic (bnc#1012382).
- alsa: bebob: use address returned by kmalloc() instead of kernel stack for streaming DMA mapping (bnc#1012382).
- alsa: emu10k1: fix possible info leak to userspace on SNDRV_EMU10K1_IOCTL_INFO (bnc#1012382).
- alsa: hda: Add AZX_DCAPS_PM_RUNTIME for AMD Raven Ridge (bnc#1012382).
- alsa: hda - Fix cancel_work_sync() stall from jackpoll work (bnc#1012382).
- alsa: hda/realtek - Cannot adjust speaker's volume on Dell XPS 27 7760 (bnc#1012382).
- alsa: msnd: Fix the default sample sizes (bnc#1012382).
- alsa: pcm: Fix snd_interval_refine first/last with open min/max (bnc#1012382).
- alsa: usb-audio: Fix multiple definitions in AU0828_DEVICE() macro (bnc#1012382).
- apparmor: remove no-op permission check in policy_unpack (git-fixes).
- arc: build: Get rid of toolchain check (bnc#1012382).
- arc: clone syscall to setp r25 as thread pointer (bnc#1012382).
- arch/hexagon: fix kernel/dma.c build warning (bnc#1012382).
- arc: [plat-axs*]: Enable SWAP (bnc#1012382).
- arm64: bpf: jit JMP_JSET_{X,K} (bsc#1110613).
- arm64: Correct type for PUD macros (bsc#1110600).
- arm64: cpufeature: Track 32bit EL0 support (bnc#1012382).
- arm64: dts: qcom: db410c: Fix Bluetooth LED trigger (bnc#1012382).
- arm64: fix erroneous __raw_read_system_reg() cases (bsc#1110606).
- arm64: Fix potential race with hardware DBM in ptep_set_access_flags() (bsc#1110605).
- arm64: fpsimd: Avoid FPSIMD context leakage for the init task (bsc#1110603).
- arm64: jump_label.h: use asm_volatile_goto macro instead of 'asm goto' (bnc#1012382).
- arm64: kasan: avoid bad virt_to_pfn() (bsc#1110612).
- arm64: kasan: avoid pfn_to_nid() before page array is initialized (bsc#1110619).
- arm64/kasan: do not allocate extra shadow memory (bsc#1110611).
- arm64: kernel: Update kerneldoc for cpu_suspend() rename (bsc#1110602).
- arm64: kgdb: handle read-only text / modules (bsc#1110604).
- arm64: kvm: Sanitize PSTATE.M when being set from userspace (bnc#1012382).
- arm64: kvm: Tighten guest core register access from userspace (bnc#1012382).
- arm64/mm/kasan: do not use vmemmap_populate() to initialize shadow (bsc#1110618).
- arm64: ptrace: Avoid setting compat FP[SC]R to garbage if get_user fails (bsc#1110601).
- arm64: supported.conf: mark armmmci as not supported
- arm64 Update config files. (bsc#1110468) Set MMC_QCOM_DML to build-in and delete driver from supported.conf
- arm64: vdso: fix clock_getres for 4GiB-aligned res (bsc#1110614).
- arm: dts: at91: add new compatibility string for macb on sama5d3 (bnc#1012382).
- arm: dts: dra7: fix DCAN node addresses (bnc#1012382).
- arm: exynos: Clear global variable on init error path (bnc#1012382).
- arm: hisi: check of_iomap and fix missing of_node_put (bnc#1012382).
- arm: hisi: fix error handling and missing of_node_put (bnc#1012382).
- arm: hisi: handle of_iomap and fix missing of_node_put (bnc#1012382).
- arm: mvebu: declare asm symbols as character arrays in pmsu.c (bnc#1012382).
- ASoC: cs4265: fix MMTLR Data switch control (bnc#1012382).
- ASoC: dapm: Fix potential DAI widget pointer deref when linking DAIs (bnc#1012382).
- ASoC: sigmadsp: safeload should not have lower byte limit (bnc#1012382).
- ASoC: wm8804: Add ACPI support (bnc#1012382).
- ata: libahci: Correct setting of DEVSLP register (bnc#1012382).
- ath10k: disable bundle mgmt tx completion event support (bnc#1012382).
- ath10k: fix scan crash due to incorrect length calculation (bnc#1012382).
- ath10k: fix use-after-free in ath10k_wmi_cmd_send_nowait (bnc#1012382).
- ath10k: prevent active scans on potential unusable channels (bnc#1012382).
- ath10k: protect ath10k_htt_rx_ring_free with rx_ring.lock (bnc#1012382).
- audit: fix use-after-free in audit_add_watch (bnc#1012382).
- autofs: fix autofs_sbi() does not check super block type (bnc#1012382).
- binfmt_elf: Respect error return from `regset->active' (bnc#1012382).
- bluetooth: Add a new Realtek 8723DE ID 0bda:b009 (bnc#1012382).
- bluetooth: h5: Fix missing dependency on BT_HCIUART_SERDEV (bnc#1012382).
- bluetooth: hidp: Fix handling of strncpy for hid->name information (bnc#1012382).
- bnxt_en: Fix TX timeout during netpoll (bnc#1012382).
- bonding: avoid possible dead-lock (bnc#1012382).
- bpf: fix cb access in socket filter programs on tail calls (bsc#1012382).
- bpf: fix map not being uncharged during map creation failure (bsc#1012382).
- bpf, s390: fix potential memleak when later bpf_jit_prog fails (git-fixes).
- bpf, s390x: do not reload skb pointers in non-skb context (git-fixes).
- bsc#1106913: Replace with upstream variants
- btrfs: add a comp_refs() helper (dependency for bsc#1031392).
- btrfs: add missing initialization in btrfs_check_shared (Git-fixes bsc#1112262).
- btrfs: add tracepoints for outstanding extents mods (dependency for bsc#1031392).
- btrfs: add wrapper for counting BTRFS_MAX_EXTENT_SIZE (dependency for bsc#1031392).
- btrfs: cleanup extent locking sequence (dependency for bsc#1031392).
- btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag (Follow up fixes for bsc#1031392).
- btrfs: delayed-inode: Remove wrong qgroup meta reservation calls (bsc#1031392).
- btrfs: delayed-inode: Use new qgroup meta rsv for delayed inode and item (bsc#1031392).
- btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667).
- btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).
- btrfs: fix error handling in btrfs_dev_replace_start (bsc#1107535).
- btrfs: fix invalid attempt to free reserved space on failure to cow range (dependency for bsc#1031392).
- btrfs: fix missing error return in btrfs_drop_snapshot (Git-fixes bsc#1109919).
- btrfs: Fix race condition between delayed refs and blockgroup removal (Git-fixes bsc#1112263).
- btrfs: Fix wrong btrfs_delalloc_release_extents parameter (bsc#1031392).
- btrfs: kill trans in run_delalloc_nocow and btrfs_cross_ref_exist (dependency for bsc#1031392).
- btrfs: make the delalloc block rsv per inode (dependency for bsc#1031392).
- btrfs: pass delayed_refs directly to btrfs_find_delayed_ref_head (dependency for bsc#1031392).
- btrfs: qgroup: Add quick exit for non-fs extents (dependency for bsc#1031392).
- btrfs: qgroup: Cleanup btrfs_qgroup_prepare_account_extents function (dependency for bsc#1031392).
- btrfs: qgroup: Cleanup the remaining old reservation counters (bsc#1031392).
- btrfs: qgroup: Commit transaction in advance to reduce early EDQUOT (bsc#1031392).
- btrfs: qgroup: Do not use root->qgroup_meta_rsv for qgroup (bsc#1031392).
- btrfs: qgroup: Fix wrong qgroup reservation update for relationship modification (bsc#1031392).
- btrfs: qgroup: Introduce function to convert META_PREALLOC into META_PERTRANS (bsc#1031392).
- btrfs: qgroup: Introduce helpers to update and access new qgroup rsv (bsc#1031392).
- btrfs: qgroup: Make qgroup_reserve and its callers to use separate reservation type (bsc#1031392).
- btrfs: qgroup: Skeleton to support separate qgroup reservation type (bsc#1031392).
- btrfs: qgroups: opencode qgroup_free helper (dependency for bsc#1031392).
- btrfs: qgroup: Split meta rsv type into meta_prealloc and meta_pertrans (bsc#1031392).
- btrfs: qgroup: Update trace events for metadata reservation (bsc#1031392).
- btrfs: qgroup: Update trace events to use new separate rsv types (bsc#1031392).
- btrfs: qgroup: Use independent and accurate per inode qgroup rsv (bsc#1031392).
- btrfs: qgroup: Use root::qgroup_meta_rsv_* to record qgroup meta reserved space (bsc#1031392).
- btrfs: qgroup: Use separate meta reservation type for delalloc (bsc#1031392).
- btrfs: remove type argument from comp_tree_refs (dependency for bsc#1031392).
- btrfs: rework outstanding_extents (dependency for bsc#1031392).
- btrfs: switch args for comp_*_refs (dependency for bsc#1031392).
- btrfs: Take trans lock before access running trans in check_delayed_ref (Follow up fixes for bsc#1031392).
- ceph: avoid a use-after-free in ceph_destroy_options() (bsc#1112007).
- cfg80211: fix a type issue in ieee80211_chandef_to_operating_class() (bnc#1012382).
- cfg80211: nl80211_update_ft_ies() to validate NL80211_ATTR_IE (bnc#1012382).
- cfq: Give a chance for arming slice idle timer in case of group_idle (bnc#1012382).
- cgroup: Fix deadlock in cpu hotplug path (bnc#1012382).
- cgroup, netclassid: add a preemption point to write_classid (bnc#1098996).
- cifs: check for STATUS_USER_SESSION_DELETED (bsc#1112902).
- cifs: connect to servername instead of IP for IPC$ share (bsc#1106359).
- cifs: fix memory leak in SMB2_open() (bsc#1112894).
- cifs: Fix use after free of a mid_q_entry (bsc#1112903).
- cifs: fix wrapping bugs in num_entries() (bnc#1012382).
- cifs: integer overflow in in SMB2_ioctl() (bsc#1012382).
- cifs: prevent integer overflow in nxt_dir_entry() (bnc#1012382).
- cifs: read overflow in is_valid_oplock_break() (bnc#1012382).
- clk: imx6ul: fix missing of_node_put() (bnc#1012382).
- clocksource/drivers/ti-32k: Add CLOCK_SOURCE_SUSPEND_NONSTOP flag for non-am43 SoCs (bnc#1012382).
- config.sh: set BUGZILLA_PRODUCT for SLE12-SP3
- coresight: Handle errors in finding input/output ports (bnc#1012382).
- coresight: tpiu: Fix disabling timeouts (bnc#1012382).
- cpu/hotplug: Fix SMT supported evaluation (bsc#1089343).
- crypto: mxs-dcp - Fix wait logic on chan threads (bnc#1012382).
- crypto: sharah - Unregister correct algorithms for SAHARA 3 (bnc#1012382).
- crypto: skcipher - Fix -Wstringop-truncation warnings (bnc#1012382).
- Define dependencies of in-kernel KMPs statically This allows us to use rpm's internal dependency generator (bsc#981083).
- Define early_radix_enabled() (bsc#1094244).
- dmaengine: pl330: fix irq race with terminate_all (bnc#1012382).
- dm cache: fix resize crash if user does not reload cache table (bnc#1012382).
- dm thin metadata: fix __udivdi3 undefined on 32-bit (bnc#1012382).
- dm thin metadata: try to avoid ever aborting transactions (bnc#1012382).
- Do not ship firmware (bsc#1054239). Pull firmware from kernel-firmware instead.
- drivers: net: cpsw: fix parsing of phy-handle DT property in dual_emac config (bnc#1012382).
- drivers: net: cpsw: fix segfault in case of bad phy-handle (bnc#1012382).
- drivers/tty: add error handling for pcmcia_loop_config (bnc#1012382).
- drm/amdgpu: Fix SDMA HQD destroy error on gfx_v7 (bnc#1012382).
- drm/amdkfd: Fix error codes in kfd_get_process (bnc#1012382).
- drm/nouveau/drm/nouveau: Use pm_runtime_get_noresume() in connector_detect() (bnc#1012382).
- drm/nouveau/TBDdevinit: do not fail when PMU/PRE_OS is missing from VBIOS (bnc#1012382).
- drm/nouveau: tegra: Detach from ARM DMA/IOMMU mapping (bnc#1012382).
- drm/virtio: fix bounds check in virtio_gpu_cmd_get_capset() (bsc#1106929)
- Drop dtb-source.spec and move the sources to kernel-source (bsc#1011920)
- e1000: check on netif_running() before calling e1000_up() (bnc#1012382).
- e1000: ensure to free old tx/rx rings in set_ringparam() (bnc#1012382).
- ebtables: arpreply: Add the standard target sanity check (bnc#1012382).
- edac, thunderx: Fix memory leak in thunderx_l2c_threaded_isr() (bsc#1114648).
- ethernet: ti: davinci_emac: add missing of_node_put after calling of_parse_phandle (bnc#1012382).
- ethtool: Remove trailing semicolon for static inline (bnc#1012382).
- ethtool: restore erroneously removed break in dev_ethtool (bsc#1114229).
- ext4: avoid divide by zero fault when deleting corrupted inline directories (bnc#1012382).
- ext4: do not mark mmp buffer head dirty (bnc#1012382).
- ext4: fix online resize's handling of a too-small final block group (bnc#1012382).
- ext4: fix online resizing for bigalloc file systems with a 1k block size (bnc#1012382).
- ext4: recalucate superblock checksum after updating free blocks/inodes (bnc#1012382).
- f2fs: do not set free of current section (bnc#1012382).
- f2fs: fix to do sanity check with {sit,nat}_ver_bitmap_bytesize (bnc#1012382).
- fbdev: Distinguish between interlaced and progressive modes (bnc#1012382).
- fbdev: fix broken menu dependencies (bsc#1106929)
- fbdev/omapfb: fix omapfb_memory_read infoleak (bnc#1012382).
- fbdev/via: fix defined but not used warning (bnc#1012382).
- floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl (bnc#1012382).
- fs/cifs: do not translate SFM_SLASH (U+F026) to backslash (bnc#1012382).
- fs/cifs: suppress a string overflow warning (bnc#1012382).
- fs/eventpoll: loosen irq-safety when possible (bsc#1096052).
- gfs2: Special-case rindex for gfs2_grow (bnc#1012382).
- gpio: adp5588: Fix sleep-in-atomic-context bug (bnc#1012382).
- gpiolib: Mark gpio_suffixes array with __maybe_unused (bnc#1012382).
- gpio: ml-ioh: Fix buffer underwrite on probe error path (bnc#1012382).
- gpio: tegra: Move driver registration to subsys_init level (bnc#1012382).
- gso_segment: Reset skb->mac_len after modifying network header (bnc#1012382).
- hexagon: modify ffs() and fls() to return int (bnc#1012382).
- hid: hid-ntrig: add error handling for sysfs_create_group (bnc#1012382).
- hid: sony: Support DS4 dongle (bnc#1012382).
- hid: sony: Update device ids (bnc#1012382).
- hv: avoid crash in vmbus sysfs files (bnc#1108377).
- hwmon: (adt7475) Make adt7475_read_word() return errors (bnc#1012382).
- hwmon: (ina2xx) fix sysfs shunt resistor read access (bnc#1012382).
- i2c: i2c-scmi: fix for i2c_smbus_write_block_data (bnc#1012382).
- i2c: i801: Allow ACPI AML access I/O ports not reserved for SMBus (bnc#1012382).
- i2c: i801: fix DNV's SMBCTRL register offset (bnc#1012382).
- i2c: uniphier-f: issue STOP only for last message or I2C_M_STOP (bnc#1012382).
- i2c: uniphier: issue STOP only for last message or I2C_M_STOP (bnc#1012382).
- i2c: xiic: Make the start and the byte count write atomic (bnc#1012382).
- i2c: xlp9xx: Add support for SMBAlert (bsc#1103308).
- i2c: xlp9xx: Fix case where SSIF read transaction completes early (bsc#1103308).
- i2c: xlp9xx: Fix issue seen when updating receive length (bsc#1103308).
- i2c: xlp9xx: Make sure the transfer size is not more than I2C_SMBUS_BLOCK_SIZE (bsc#1103308).
- ib/ipoib: Avoid a race condition between start_xmit and cm_rep_handler (bnc#1012382).
- ib/srp: Avoid that sg_reset -d ${srp_device} triggers an infinite loop (bnc#1012382).
- input: atakbd - fix Atari CapsLock behaviour (bnc#1012382).
- input: atakbd - fix Atari keymap (bnc#1012382).
- input: atmel_mxt_ts - only use first T9 instance (bnc#1012382).
- input: elantech - enable middle button of touchpad on ThinkPad P72 (bnc#1012382).
- iommu/amd: Return devid as alias for ACPI HID devices (bsc#1106105).
- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bnc#1012382).
- iommu/ipmmu-vmsa: Fix allocation in atomic context (bnc#1012382).
- ip6_tunnel: be careful when accessing the inner header (bnc#1012382).
- ipmi:ssif: Add support for multi-part transmit messages > 2 parts (bsc#1103308).
- ip_tunnel: be careful when accessing the inner header (bnc#1012382).
- ipv4: fix use-after-free in ip_cmsg_recv_dstaddr() (bnc#1012382).
- ipv6: fix possible use-after-free in ip6_xmit() (bnc#1012382).
- iw_cxgb4: only allow 1 flush on user qps (bnc#1012382).
- ixgbe: pci_set_drvdata must be called before register_netdev (Git-fixes bsc#1109923).
- jffs2: return -ERANGE when xattr buffer is too small (bnc#1012382).
- KABI: move the new handler to end of machdep_calls and hide it from genksyms (bsc#1094244).
- kABI: protect struct hnae_desc_cb (kabi).
- kbuild: add .DELETE_ON_ERROR special target (bnc#1012382).
- kernel-obs-build.spec.in: add --no-hostonly-cmdline to dracut invocation (boo#1062303). call dracut with --no-hostonly-cmdline to avoid the random rootfs UUID being added into the initrd's /etc/cmdline.d/95root-dev.conf
- kernel-obs-build: use pae and lpae kernels where available (bsc#1073579).
- kernel/params.c: downgrade warning for unsafe parameters (bsc#1050549).
- kprobes/x86: Release insn_slot in failure path (bsc#1110006).
- kthread: fix boot hang (regression) on MIPS/OpenRISC (bnc#1012382).
- kthread: Fix use-after-free if kthread fork fails (bnc#1012382).
- kvm: nVMX: Do not expose MPX VMX controls when guest MPX disabled (bsc#1106240).
- kvm: nVMX: Do not flush TLB when vmcs12 uses VPID (bsc#1106240).
- kvm: PPC: Book3S HV: Do not truncate HPTE index in xlate function (bnc#1012382).
- kvm: x86: Do not re-{try,execute} after failed emulation in L2 (bsc#1106240).
- kvm: x86: Do not use kvm_x86_ops->mpx_supported() directly (bsc#1106240).
- kvm: x86: fix APIC page invalidation (bsc#1106240).
- kvm: x86: remove eager_fpu field of struct kvm_vcpu_arch (bnc#1012382).
- kvm/x86: remove WARN_ON() for when vm_munmap() fails (bsc#1106240).
- kvm: x86: SVM: Call x86_spec_ctrl_set_guest/host() with interrupts disabled (bsc#1106240).
- lib/test_hexdump.c: fix failure on big endian cpu (bsc#1106110).
- locking/osq_lock: Fix osq_lock queue corruption (bnc#1012382).
- locking/rwsem-xadd: Fix missed wakeup due to reordering of load (bnc#1012382).
- lpfc: fixup crash in lpfc_els_unsol_buffer() (bsc#1107318).
- mac80211: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bnc#1012382).
- mac80211: fix a race between restart and CSA flows (bnc#1012382).
- mac80211: fix setting IEEE80211_KEY_FLAG_RX_MGMT for AP mode keys (bnc#1012382).
- mac80211: Fix station bandwidth setting after channel switch (bnc#1012382).
- mac80211_hwsim: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bnc#1012382).
- mac80211: mesh: fix HWMP sequence numbering to follow standard (bnc#1012382).
- mac80211: restrict delayed tailroom needed decrement (bnc#1012382).
- mac80211: shorten the IBSS debug messages (bnc#1012382).
- mach64: detect the dot clock divider correctly on sparc (bnc#1012382).
- macintosh/via-pmu: Add missing mmio accessors (bnc#1012382).
- macros.kernel-source: define linux_arch for KMPs (boo#1098050). CONFIG_64BIT is no longer defined so KMP spec files need to include %{?linux_make_arch} in any make call to build modules or descent into the kernel directory for any reason.
- macros.kernel-source: pass -b properly in kernel module package (bsc#1107870).
- macros.kernel-source: pass -f properly in module subpackage (boo#1076393).
- md-cluster: clear another node's suspend_area after the copy is finished (bnc#1012382).
- md/raid1: exit sync request if MD_RECOVERY_INTR is set (git-fixes).
- md/raid5: fix data corruption of replacements after originals dropped (bnc#1012382).
- media: af9035: prevent buffer overflow on write (bnc#1012382).
- media: exynos4-is: Prevent NULL pointer dereference in __isp_video_try_fmt() (bnc#1012382).
- media: fsl-viu: fix error handling in viu_of_probe() (bnc#1012382).
- media: omap3isp: zero-initialize the isp cam_xclk{a,b} initial data (bnc#1012382).
- media: omap_vout: Fix a possible null pointer dereference in omap_vout_open() (bsc#1050431).
- media: s3c-camif: ignore -ENOIOCTLCMD from v4l2_subdev_call for s_power (bnc#1012382).
- media: soc_camera: ov772x: correct setting of banding filter (bnc#1012382).
- media: tm6000: add error handling for dvb_register_adapter (bnc#1012382).
- media: uvcvideo: Support realtek's UVC 1.5 device (bnc#1012382).
- media: v4l: event: Prevent freeing event subscriptions while accessed (bnc#1012382).
- media: videobuf2-core: check for q->error in vb2_core_qbuf() (bnc#1012382).
- media: videobuf-dma-sg: Fix dma_{sync,unmap}_sg() calls (bsc#1050431).
- mei: bus: type promotion bug in mei_nfc_if_version() (bnc#1012382).
- memory_hotplug: cond_resched in __remove_pages (bnc#1114178).
- mfd: omap-usb-host: Fix dts probe of children (bnc#1012382).
- mfd: ti_am335x_tscadc: Fix struct clk memory leak (bnc#1012382).
- misc: hmc6352: fix potential Spectre v1 (bnc#1012382).
- misc: mic: SCIF Fix scif_get_new_port() error handling (bnc#1012382).
- misc: ti-st: Fix memory leak in the error path of probe() (bnc#1012382).
- mmc: mmci: stop building qcom dml as module (bsc#1110468).
- mm: fix devmem_is_allowed() for sub-page System RAM intersections (bsc#1110006).
- mm: get rid of vmacache_flush_all() entirely (bnc#1012382).
- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (bnc#1012382).
- mm: /proc/pid/pagemap: hide swap entries from unprivileged users (Git-fixes bsc#1109907).
- mm: shmem.c: Correctly annotate new inodes for lockdep (bnc#1012382).
- mm/vmstat.c: fix outdated vmstat_text (bnc#1012382).
- mm/vmstat.c: skip NR_TLB_REMOTE_FLUSH* properly (bnc#1012382).
- mm/vmstat.c: skip NR_TLB_REMOTE_FLUSH* properly (git fixes).
- module: exclude SHN_UNDEF symbols from kallsyms api (bnc#1012382).
- mtdchar: fix overflows in adjustment of `count` (bnc#1012382).
- mtd/maps: fix solutionengine.c printk format warnings (bnc#1012382).
- neighbour: confirm neigh entries when ARP packet is received (bnc#1012382).
- net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT (bnc#1012382).
- net: cadence: Fix a sleep-in-atomic-context bug in macb_halt_tx() (bnc#1012382).
- net: dcb: For wild-card lookups, use priority -1, not 0 (bnc#1012382).
- net: ethernet: mvneta: Fix napi structure mixup on armada 3700 (bsc#1110616).
- net: ethernet: ti: cpsw: fix mdio device reference leak (bnc#1012382).
- netfilter: x_tables: avoid stack-out-of-bounds read in xt_copy_counters_from_user (bnc#1012382).
- net: hns: fix length and page_offset overflow when CONFIG_ARM64_64K_PAGES (bnc#1012382).
- net: hp100: fix always-true check for link up state (bnc#1012382).
- net: ipv4: update fnhe_pmtu when first hop's MTU changes (bnc#1012382).
- net/ipv6: Display all addresses in output of /proc/net/if_inet6 (bnc#1012382).
- netlabel: check for IPV4MASK in addrinfo_get (bnc#1012382).
- net: macb: disable scatter-gather for macb on sama5d3 (bnc#1012382).
- net/mlx4: Use cpumask_available for eq->affinity_mask (bnc#1012382).
- net: mvneta: fix mtu change on port without link (bnc#1012382).
- net: mvneta: fix mvneta_config_rss on armada 3700 (bsc#1110615).
- net: mvpp2: Extract the correct ethtype from the skb for tx csum offload (bnc#1012382).
- net: systemport: Fix wake-up interrupt race during resume (bnc#1012382).
- net/usb: cancel pending work when unbinding smsc75xx (bnc#1012382).
- nfc: Fix possible memory corruption when handling SHDLC I-Frame commands (bnc#1012382).
- nfc: Fix the number of pipes (bnc#1012382).
- nfs: add nostatflush mount option (bsc#1065726).
- nfs: Avoid quadratic search when freeing delegations (bsc#1084760).
- nfsd: fix corrupted reply to badly ordered compound (bnc#1012382).
- nfs: Use an appropriate work queue for direct-write completion (bsc#1082519).
- nfsv4.0 fix client reference leak in callback (bnc#1012382).
- ocfs2: fix locking for res->tracking and dlm->tracking_list (bnc#1012382).
- ocfs2: fix ocfs2 read block panic (bnc#1012382).
- of: unittest: Disable interrupt node tests for old world MAC systems (bnc#1012382).
- ovl: Copy inode attributes after setting xattr (bsc#1107299).
- parport: sunbpp: fix error return code (bnc#1012382).
- partitions/aix: append null character to print data from disk (bnc#1012382).
- partitions/aix: fix usage of uninitialized lv_info and lvname structures (bnc#1012382).
- Pass x86 as architecture on x86_64 and i386 (bsc#1093118).
- pci: altera: Fix bool initialization in tlp_read_packet() (bsc#1109806).
- pci: designware: Fix I/O space page leak (bsc#1109806).
- pci: designware: Fix pci_remap_iospace() failure path (bsc#1109806).
- pci: hv: Use effective affinity mask (bsc#1109772).
- pci: OF: Fix I/O space page leak (bsc#1109806).
- pci: pciehp: Fix unprotected list iteration in IRQ handler (bsc#1109806).
- pci: Reprogram bridge prefetch registers on resume (bnc#1012382).
- pci: shpchp: Fix AMD POGO identification (bsc#1109806).
- pci: Supply CPU physical address (not bus address) to iomem_is_exclusive() (bsc#1109806).
- pci: versatile: Fix I/O space page leak (bsc#1109806).
- pci: versatile: Fix pci_remap_iospace() failure path (bsc#1109806).
- pci: xgene: Fix I/O space page leak (bsc#1109806).
- pci: xilinx: Add missing of_node_put() (bsc#1109806).
- perf powerpc: Fix callchain ip filtering (bnc#1012382).
- perf powerpc: Fix callchain ip filtering when return address is in a register (bnc#1012382).
- perf probe powerpc: Ignore SyS symbols irrespective of endianness (bnc#1012382).
- perf script python: Fix export-to-postgresql.py occasional failure (bnc#1012382).
- perf tools: Allow overriding MAX_NR_CPUS at compile time (bnc#1012382).
- phy: qcom-ufs: add MODULE_LICENSE tag (bsc#1110468).
- pinctrl: qcom: spmi-gpio: Fix pmic_gpio_config_get() to be compliant (bnc#1012382).
- pipe: actually allow root to exceed the pipe buffer limit (git-fixes).
- platform/x86: alienware-wmi: Correct a memory leak (bnc#1012382).
- platform/x86: toshiba_acpi: Fix defined but not used build warnings (bnc#1012382).
- pm / core: Clear the direct_complete flag on errors (bnc#1012382).
- powerpc/64s: move machine check SLB flushing to mm/slb.c (bsc#1094244).
- powerpc/kdump: Handle crashkernel memory reservation failure (bnc#1012382).
- powerpc/mce: Fix SLB rebolting during MCE recovery path (bsc#1094244).
- powerpc/numa: Skip onlining a offline node in kdump path (bsc#1109784).
- powerpc/numa: Use associativity if VPHN hcall is successful (bsc#1110363).
- powerpc/perf/hv-24x7: Fix passing of catalog version number (bsc#1053043).
- powerpc/powernv: opal_put_chars partial write fix (bnc#1012382).
- powerpc/pseries: Defer the logging of rtas error to irq work queue (bsc#1094244).
- powerpc/pseries: Define MCE error event section (bsc#1094244).
- powerpc/pseries: Display machine check error details (bsc#1094244).
- powerpc/pseries: Dump the SLB contents on SLB MCE errors (bsc#1094244).
- powerpc/pseries: Fix build break for SPLPAR=n and CPU hotplug (bsc#1079524, git-fixes).
- powerpc/pseries: Fix CONFIG_NUMA=n build (bsc#1067906, git-fixes).
- powerpc/pseries: Flush SLB contents on SLB MCE errors (bsc#1094244).
- powerpc/pseries/mm: call H_BLOCK_REMOVE (bsc#1109158).
- powerpc/pseries/mm: factorize PTE slot computation (bsc#1109158).
- powerpc/pseries/mm: Introducing FW_FEATURE_BLOCK_REMOVE (bsc#1109158).
- powerpc/rtas: Fix a potential race between CPU-Offline & Migration (bsc#1111870).
- powerpc/tm: Avoid possible userspace r1 corruption on reclaim (bsc#1109333).
- power: vexpress: fix corruption in notifier registration (bnc#1012382).
- printk: do not spin in printk when in nmi (bsc#1094244).
- proc: restrict kernel stack dumps to root (bnc#1012382).
- pstore: Fix incorrect persistent ram buffer mapping (bnc#1012382).
- qlcnic: fix Tx descriptor corruption on 82xx devices (bnc#1012382).
- r8169: Clear RTL_FLAG_TASK_*_PENDING when clearing RTL_FLAG_TASK_ENABLED (bnc#1012382).
- raid10 BUG_ON in raise_barrier when force is true and conf->barrier is 0 (bnc#1012382).
- rculist: add list_for_each_entry_from_rcu() (bsc#1084760).
- rculist: Improve documentation for list_for_each_entry_from_rcu() (bsc#1084760).
- rdma/cma: Do not ignore net namespace for unbound cm_id (bnc#1012382).
- rdma/cma: Protect cma dev list with lock (bnc#1012382).
- rdma/ucma: check fd type in ucma_migrate_id() (bnc#1012382).
- reiserfs: add check to detect corrupted directory entry (bsc#1109818).
- reiserfs: do not panic on bad directory entries (bsc#1109818).
- resource: Include resource end in walk_*() interfaces (bsc#1114648).
- Revert 'btrfs: qgroups: Retry after commit on getting EDQUOT' (bsc#1031392).
- Revert 'dma-buf/sync-file: Avoid enable fence signaling if poll(.timeout=0)' (bsc#1111363).
- Revert 'drm: Do not pass negative delta to ktime_sub_ns()' (bsc#1106929)
- Revert 'drm/i915: Initialize HWS page address after GPU reset' (bsc#1106929)
- Revert 'Drop kernel trampoline stack.' This reverts commit 85dead31706c1c1755adff90405ff9861c39c704.
- Revert 'kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)' This reverts commit edde1f21880e3bfe244c6f98a3733b05b13533dc.
- Revert 'kvm: x86: remove eager_fpu field of struct kvm_vcpu_arch' (kabi).
- Revert 'media: v4l: event: Prevent freeing event subscriptions while accessed' (kabi).
- Revert 'mm: get rid of vmacache_flush_all() entirely' (kabi).
- Revert 'NFC: Fix the number of pipes' (kabi).
- Revert 'proc: restrict kernel stack dumps to root' (kabi).
- Revert 'Skip intel_crt_init for Dell XPS 8700' (bsc#1106929)
- Revert 'tcp: add tcp_ooo_try_coalesce() helper' (kabi).
- Revert 'tcp: call tcp_drop() from tcp_data_queue_ofo()' (kabi).
- Revert 'tcp: fix a stale ooo_last_skb after a replace' (kabi).
- Revert 'tcp: free batches of packets in tcp_prune_ofo_queue()' (kabi).
- Revert 'tcp: use an RB tree for ooo receive queue' (kabi).
- Revert 'usb: cdc-wdm: Fix a sleep-in-atomic-context bug in service_outstanding_interrupt()' (bnc#1012382).
- Revert 'x86/fpu: Finish excising 'eagerfpu'' (kabi).
- Revert 'x86/fpu: Remove struct fpu::counter' (kabi).
- Revert 'x86/fpu: Remove use_eager_fpu()' (kabi).
- ring-buffer: Allow for rescheduling when removing pages (bnc#1012382).
- rndis_wlan: potential buffer overflow in rndis_wlan_auth_indication() (bnc#1012382).
- rpm/kernel-binary.spec.in: Check module licenses (bsc#1083215,bsc#1083527)
- rpm/kernel-binary.spec.in: Do not sign modules if CONFIG_MODULE_SIG=n (bsc#1035053)
- rpm/kernel-binary.spec.in: Obsolete ftsteutates KMP (boo#997172)
- rpm/kernel-binary.spec.in: Only kernel-syzkaller needs gcc-devel (boo#1043591).
- rpm/kernel-docs.spec.in: Expand kernel tree directly from sources (bsc#1057199)
- rpm/kernel-docs.spec.in: Fix and cleanup for 4.13 doc build (bsc#1048129) The whole DocBook stuff has been deleted. The PDF build still non-working thus the sub-packaging disabled so far.
- rpm/kernel-docs.spec.in: refresh dependencies for PDF build (bsc#1048129) But it still does not work with Tex Live 2017, thus disabled yet. Also add texlive-anyfontsize for HTML math handling.
- rpm/kernel-module-subpackage: Generate proper supplements in the template ... instead of relying on find-provides.ksyms to do it (bsc#981083).
- rpm/kernel-source.spec.in: Do not list deleted depdendency helpers (bsc#981083).
- rpm/kernel-spec-macros: Try harder to detect Build Service environment (bsc#1078788)
- rtc: bq4802: add error handling for devm_ioremap (bnc#1012382).
- rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096 (bnc#1012382).
- s390/chsc: Add exception handler for CHSC instruction (git-fixes).
- s390/extmem: fix gcc 8 stringop-overflow warning (bnc#1012382).
- s390/facilites: use stfle_fac_list array size for MAX_FACILITY_BIT (bnc#1108315, LTC#171326).
- s390/kdump: Fix elfcorehdr size calculation (git-fixes).
- s390/kdump: Make elfcorehdr size calculation ABI compliant (git-fixes).
- s390/mm: correct allocate_pgste proc_handler callback (git-fixes).
- s390/qeth: do not dump past end of unknown HW header (bnc#1012382).
- s390/qeth: fix race in used-buffer accounting (bnc#1012382).
- s390/qeth: handle failure on workqueue creation (git-fixes).
- s390/qeth: reset layer2 attribute on layer switch (bnc#1012382).
- s390/qeth: use vzalloc for QUERY OAT buffer (bnc#1108315, LTC#171527).
- s390: revert ELF_ET_DYN_BASE base changes (git-fixes).
- s390/stacktrace: fix address ranges for asynchronous and panic stack (git-fixes).
- sched/fair: Fix bandwidth timer clock drift condition (Git-fixes).
- sched/fair: Fix vruntime_normalized() for remote non-migration wakeup (Git-fixes).
- scsi: 3ware: fix return 0 on the error path of probe (bnc#1012382).
- scsi: bnx2i: add error handling for ioremap_nocache (bnc#1012382).
- scsi: ibmvscsi: Improve strings handling (bnc#1012382).
- scsi: klist: Make it safe to use klists in atomic context (bnc#1012382).
- scsi: target: fix __transport_register_session locking (bnc#1012382).
- scsi: target/iscsi: Make iscsit_ta_authentication() respect the output buffer size (bnc#1012382).
- selftests/efivarfs: add required kernel configs (bnc#1012382).
- selftest: timers: Tweak raw_skew to SKIP when ADJ_OFFSET/other clock adjustments are in progress (bnc#1012382).
- selinux: use GFP_NOWAIT in the AVC kmem_caches (bnc#1012382).
- serial: cpm_uart: return immediately from console poll (bnc#1012382).
- serial: imx: restore handshaking irq for imx1 (bnc#1012382).
- signal: Properly deliver SIGSEGV from x86 uprobes (bsc#1110006).
- slub: make ->cpu_partial unsigned int (bnc#1012382).
- smb2: fix missing files in root share directory listing (bnc#1012382).
- smb3: fill in statfs fsid and correct namelen (bsc#1112905).
- sound: enable interrupt after dma buffer initialization (bnc#1012382).
- spi: rspi: Fix interrupted DMA transfers (bnc#1012382).
- spi: rspi: Fix invalid SPI use during system suspend (bnc#1012382).
- spi: sh-msiof: Fix handling of write value for SISTR register (bnc#1012382).
- spi: sh-msiof: Fix invalid SPI use during system suspend (bnc#1012382).
- spi: tegra20-slink: explicitly enable/disable clock (bnc#1012382).
- srcu: Allow use of Tiny/Tree SRCU from both process and interrupt context (bsc#1050549).
- staging: android: ashmem: Fix mmap size validation (bnc#1012382).
- staging: rt5208: Fix a sleep-in-atomic bug in xd_copy_page (bnc#1012382).
- staging: rts5208: fix missing error check on call to rtsx_write_register (bnc#1012382).
- staging/rts5208: Fix read overflow in memcpy (bnc#1012382).
- stmmac: fix valid numbers of unicast filter entries (bnc#1012382).
- stop_machine: Atomically queue and wake stopper threads (git-fixes).
- target: log Data-Out timeouts as errors (bsc#1095805).
- target: log NOP ping timeouts as errors (bsc#1095805).
- target: split out helper for cxn timeout error stashing (bsc#1095805).
- target: stash sess_err_stats on Data-Out timeout (bsc#1095805).
- target: use ISCSI_IQN_LEN in iscsi_target_stat (bsc#1095805).
- tcp: add tcp_ooo_try_coalesce() helper (bnc#1012382).
- tcp: call tcp_drop() from tcp_data_queue_ofo() (bnc#1012382).
- tcp: fix a stale ooo_last_skb after a replace (bnc#1012382).
- tcp: free batches of packets in tcp_prune_ofo_queue() (bnc#1012382).
- tcp: increment sk_drops for dropped rx packets (bnc#1012382).
- tcp: use an RB tree for ooo receive queue (bnc#1012382).
- team: Forbid enslaving team device to itself (bnc#1012382).
- thermal: of-thermal: disable passive polling when thermal zone is disabled (bnc#1012382).
- Tools: hv: Fix a bug in the key delete code (bnc#1012382).
- tools/vm/page-types.c: fix 'defined but not used' warning (bnc#1012382).
- tools/vm/slabinfo.c: fix sign-compare warning (bnc#1012382).
- tpm: Restore functionality to xen vtpm driver (bsc#1020645, git-fixes).
- tsl2550: fix lux1_input error in low light (bnc#1012382).
- tty: Drop tty->count on tty_reopen() failure (bnc#1105428).
- tty: rocket: Fix possible buffer overwrite on register_PCI (bnc#1012382).
- tty: vt_ioctl: fix potential Spectre v1 (bnc#1012382).
- ubifs: Check for name being NULL while mounting (bnc#1012382).
- ucma: fix a use-after-free in ucma_resolve_ip() (bnc#1012382).
- uio: potential double frees if __uio_register_device() fails (bnc#1012382).
- usb: add quirk for WORLDE Controller KS49 or Prodipe MIDI 49C USB controller (bnc#1012382).
- usb: Add quirk to support DJI CineSSD (bnc#1012382).
- usb: Avoid use-after-free by flushing endpoints early in usb_set_interface() (bnc#1012382).
- usb: cdc-wdm: Fix a sleep-in-atomic-context bug in service_outstanding_interrupt() (bnc#1012382).
- usb: Do not die twice if PCI xhci host is not responding in resume (bnc#1012382).
- usb: fix error handling in usb_driver_claim_interface() (bnc#1012382).
- usb: gadget: fotg210-udc: Fix memory leak of fotg210->ep[i] (bnc#1012382).
- usb: gadget: serial: fix oops when data rx'd after close (bnc#1012382).
- usb: handle NULL config in usb_find_alt_setting() (bnc#1012382).
- usb: host: u132-hcd: Fix a sleep-in-atomic-context bug in u132_get_frame() (bnc#1012382).
- usb: misc: uss720: Fix two sleep-in-atomic-context bugs (bnc#1012382).
- usb: net2280: Fix erroneous synchronization change (bnc#1012382).
- usb: remove LPM management from usb_driver_claim_interface() (bnc#1012382).
- usb: serial: io_ti: fix array underflow in completion handler (bnc#1012382).
- usb: serial: kobil_sct: fix modem-status error handling (bnc#1012382).
- usb: serial: simple: add Motorola Tetra MTP6550 id (bnc#1012382).
- usb: serial: ti_usb_3410_5052: fix array underflow in completion handler (bnc#1012382).
- usb: usbdevfs: restore warning for nonsensical flags (bnc#1012382).
- usb: usbdevfs: sanitize flags more (bnc#1012382).
- usb: wusbcore: security: cast sizeof to int for comparison (bnc#1012382).
- usb: yurex: Check for truncation in yurex_read() (bnc#1012382).
- usb: yurex: Fix buffer over-read in yurex_write() (bnc#1012382).
- Use upstream version of pci-hyperv change 35a88a18d7
- uwb: hwa-rc: fix memory leak at probe (bnc#1012382).
- vfs: do not test owner for NFS in set_posix_acl() (bsc#1103405).
- video: goldfishfb: fix memory leak on driver remove (bnc#1012382).
- vmci: type promotion bug in qp_host_get_user_memory() (bnc#1012382).
- vmw_balloon: include asm/io.h (bnc#1012382).
- watchdog: w83627hf: Added NCT6102D support (bsc#1106434).
- wlcore: Add missing PM call for wlcore_cmd_wait_for_event_or_timeout() (bnc#1012382).
- wlcore: Fix memory leak in wlcore_cmd_wait_for_event_or_timeout (git-fixes).
- x86/apic: Fix restoring boot IRQ mode in reboot and kexec/kdump (bsc#1110006).
- x86/apic: Split disable_IO_APIC() into two functions to fix CONFIG_KEXEC_JUMP=y (bsc#1110006).
- x86/apic: Split out restore_boot_irq_mode() from disable_IO_APIC() (bsc#1110006).
- x86/boot: Fix 'run_size' calculation (bsc#1110006).
- x86/cpufeature: deduplicate X86_FEATURE_L1TF_PTEINV (kabi).
- x86/entry/64: Add two more instruction suffixes (bnc#1012382).
- x86/entry/64: Clear registers for exceptions/interrupts, to reduce speculation attack surface (bsc#1105931).
- x86/entry/64: sanitize extra registers on syscall entry (bsc#1105931).
- x86/fpu: Finish excising 'eagerfpu' (bnc#1012382).
- x86/fpu: Remove second definition of fpu in __fpu__restore_sig() (bsc#1110006).
- x86/fpu: Remove struct fpu::counter (bnc#1012382).
- x86/fpu: Remove use_eager_fpu() (bnc#1012382).
- x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772).
- x86/kaiser: Avoid loosing NMIs when using trampoline stack (bsc#1106293 bsc#1099597).
- x86/mm: Remove in_nmi() warning from vmalloc_fault() (bnc#1012382).
- x86: msr-index.h: Correct SNB_C1/C3_AUTO_UNDEMOTE defines (bsc#1110006).
- x86/numa_emulation: Fix emulated-to-physical node mapping (bnc#1012382).
- x86/paravirt: Fix some warning messages (bnc#1065600).
- x86/percpu: Fix this_cpu_read() (bsc#1110006).
- x86,sched: Allow topologies where NUMA nodes share an LLC (bsc#1091158, bsc#1101555).
- x86/spec_ctrl: Fix spec_ctrl reporting (bsc#1106913, bsc#1111516).
- x86/speculation: Apply IBPB more strictly to avoid cross-process data leak (bsc#1106913).
- x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation (bsc#1106913).
- x86/speculation: Propagate information about RSB filling mitigation to sysfs (bsc#1106913).
- x86/time: Correct the attribute on jiffies' definition (bsc#1110006).
- x86/tsc: Add missing header to tsc_msr.c (bnc#1012382).
- x86/vdso: Fix asm constraints on vDSO syscall fallbacks (bsc#1110006).
- x86/vdso: Fix vDSO build if a retpoline is emitted (bsc#1110006).
- x86/vdso: Fix vDSO syscall fallback asm constraint regression (bsc#1110006).
- x86/vdso: Only enable vDSO retpolines when enabled and supported (bsc#1110006).
- xen: avoid crash in disable_hotplug_cpu (bnc#1012382 bsc#1106594 bsc#1042422).
- xen: fix GCC warning and remove duplicate EVTCHN_ROW/EVTCHN_COL usage (bnc#1012382).
- xen: issue warning message when out of grant maptrack entries (bsc#1105795).
- xen/manage: do not complain about an empty value in control/sysrq node (bnc#1012382).
- xen/netfront: do not bug in case of too many frags (bnc#1012382).
- xen-netfront: fix queue name setting (bnc#1012382).
- xen/netfront: fix waiting for xenbus state change (bnc#1012382).
- xen-netfront: fix warn message as irq device name has '/' (bnc#1012382).
- xen/x86/vpmu: Zero struct pt_regs before calling into sample handling code (bnc#1012382).
- xfrm: fix 'passing zero to ERR_PTR()' warning (bnc#1012382).
- xhci: Add missing CAS workaround for Intel Sunrise Point xHCI (bnc#1012382).
- xhci: Do not print a warning when setting link state for disabled ports (bnc#1012382).
- x86/kexec: Correct KEXEC_BACKUP_SRC_END off-by-one error (bsc#1114648).
Patchnames
SUSE-SLE-DESKTOP-12-SP3-2018-2621,SUSE-SLE-HA-12-SP3-2018-2621,SUSE-SLE-SDK-12-SP3-2018-2621,SUSE-SLE-SERVER-12-SP3-2018-2621,SUSE-SLE-WE-12-SP3-2018-2621
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\n\nThe SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.162 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bnc#1107829).\n- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).\n- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).\n- CVE-2018-18690: A local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE operations with conversion of an attr from short to long form (bnc#1105025).\n- CVE-2018-18710: An issue was discovered in the Linux kernel An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).\n- CVE-2018-9516: A lack of certain checks in the hid_debug_events_read() function in the drivers/hid/hid-debug.c file might have resulted in receiving userspace buffer overflow and an out-of-bounds write or to the infinite loop. (bnc#1108498).\n\nThe following non-security bugs were fixed:\n\n- 6lowpan: iphc: reset mac_header after decompress to fix panic (bnc#1012382).\n- alsa: bebob: use address returned by kmalloc() instead of kernel stack for streaming DMA mapping (bnc#1012382).\n- alsa: emu10k1: fix possible info leak to userspace on SNDRV_EMU10K1_IOCTL_INFO (bnc#1012382).\n- alsa: hda: Add AZX_DCAPS_PM_RUNTIME for AMD Raven Ridge (bnc#1012382).\n- alsa: hda - Fix cancel_work_sync() stall from jackpoll work (bnc#1012382).\n- alsa: hda/realtek - Cannot adjust speaker's volume on Dell XPS 27 7760 (bnc#1012382).\n- alsa: msnd: Fix the default sample sizes (bnc#1012382).\n- alsa: pcm: Fix snd_interval_refine first/last with open min/max (bnc#1012382).\n- alsa: usb-audio: Fix multiple definitions in AU0828_DEVICE() macro (bnc#1012382).\n- apparmor: remove no-op permission check in policy_unpack (git-fixes).\n- arc: build: Get rid of toolchain check (bnc#1012382).\n- arc: clone syscall to setp r25 as thread pointer (bnc#1012382).\n- arch/hexagon: fix kernel/dma.c build warning (bnc#1012382).\n- arc: [plat-axs*]: Enable SWAP (bnc#1012382).\n- arm64: bpf: jit JMP_JSET_{X,K} (bsc#1110613).\n- arm64: Correct type for PUD macros (bsc#1110600).\n- arm64: cpufeature: Track 32bit EL0 support (bnc#1012382).\n- arm64: dts: qcom: db410c: Fix Bluetooth LED trigger (bnc#1012382).\n- arm64: fix erroneous __raw_read_system_reg() cases (bsc#1110606).\n- arm64: Fix potential race with hardware DBM in ptep_set_access_flags() (bsc#1110605).\n- arm64: fpsimd: Avoid FPSIMD context leakage for the init task (bsc#1110603).\n- arm64: jump_label.h: use asm_volatile_goto macro instead of 'asm goto' (bnc#1012382).\n- arm64: kasan: avoid bad virt_to_pfn() (bsc#1110612).\n- arm64: kasan: avoid pfn_to_nid() before page array is initialized (bsc#1110619).\n- arm64/kasan: do not allocate extra shadow memory (bsc#1110611).\n- arm64: kernel: Update kerneldoc for cpu_suspend() rename (bsc#1110602).\n- arm64: kgdb: handle read-only text / modules (bsc#1110604).\n- arm64: kvm: Sanitize PSTATE.M when being set from userspace (bnc#1012382).\n- arm64: kvm: Tighten guest core register access from userspace (bnc#1012382).\n- arm64/mm/kasan: do not use vmemmap_populate() to initialize shadow (bsc#1110618).\n- arm64: ptrace: Avoid setting compat FP[SC]R to garbage if get_user fails (bsc#1110601).\n- arm64: supported.conf: mark armmmci as not supported\n- arm64 Update config files. (bsc#1110468) Set MMC_QCOM_DML to build-in and delete driver from supported.conf\n- arm64: vdso: fix clock_getres for 4GiB-aligned res (bsc#1110614).\n- arm: dts: at91: add new compatibility string for macb on sama5d3 (bnc#1012382).\n- arm: dts: dra7: fix DCAN node addresses (bnc#1012382).\n- arm: exynos: Clear global variable on init error path (bnc#1012382).\n- arm: hisi: check of_iomap and fix missing of_node_put (bnc#1012382).\n- arm: hisi: fix error handling and missing of_node_put (bnc#1012382).\n- arm: hisi: handle of_iomap and fix missing of_node_put (bnc#1012382).\n- arm: mvebu: declare asm symbols as character arrays in pmsu.c (bnc#1012382).\n- ASoC: cs4265: fix MMTLR Data switch control (bnc#1012382).\n- ASoC: dapm: Fix potential DAI widget pointer deref when linking DAIs (bnc#1012382).\n- ASoC: sigmadsp: safeload should not have lower byte limit (bnc#1012382).\n- ASoC: wm8804: Add ACPI support (bnc#1012382).\n- ata: libahci: Correct setting of DEVSLP register (bnc#1012382).\n- ath10k: disable bundle mgmt tx completion event support (bnc#1012382).\n- ath10k: fix scan crash due to incorrect length calculation (bnc#1012382).\n- ath10k: fix use-after-free in ath10k_wmi_cmd_send_nowait (bnc#1012382).\n- ath10k: prevent active scans on potential unusable channels (bnc#1012382).\n- ath10k: protect ath10k_htt_rx_ring_free with rx_ring.lock (bnc#1012382).\n- audit: fix use-after-free in audit_add_watch (bnc#1012382).\n- autofs: fix autofs_sbi() does not check super block type (bnc#1012382).\n- binfmt_elf: Respect error return from `regset->active' (bnc#1012382).\n- bluetooth: Add a new Realtek 8723DE ID 0bda:b009 (bnc#1012382).\n- bluetooth: h5: Fix missing dependency on BT_HCIUART_SERDEV (bnc#1012382).\n- bluetooth: hidp: Fix handling of strncpy for hid->name information (bnc#1012382).\n- bnxt_en: Fix TX timeout during netpoll (bnc#1012382).\n- bonding: avoid possible dead-lock (bnc#1012382).\n- bpf: fix cb access in socket filter programs on tail calls (bsc#1012382).\n- bpf: fix map not being uncharged during map creation failure (bsc#1012382).\n- bpf, s390: fix potential memleak when later bpf_jit_prog fails (git-fixes).\n- bpf, s390x: do not reload skb pointers in non-skb context (git-fixes).\n- bsc#1106913: Replace with upstream variants\n- btrfs: add a comp_refs() helper (dependency for bsc#1031392).\n- btrfs: add missing initialization in btrfs_check_shared (Git-fixes bsc#1112262).\n- btrfs: add tracepoints for outstanding extents mods (dependency for bsc#1031392).\n- btrfs: add wrapper for counting BTRFS_MAX_EXTENT_SIZE (dependency for bsc#1031392).\n- btrfs: cleanup extent locking sequence (dependency for bsc#1031392).\n- btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag (Follow up fixes for bsc#1031392).\n- btrfs: delayed-inode: Remove wrong qgroup meta reservation calls (bsc#1031392).\n- btrfs: delayed-inode: Use new qgroup meta rsv for delayed inode and item (bsc#1031392).\n- btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667).\n- btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).\n- btrfs: fix error handling in btrfs_dev_replace_start (bsc#1107535).\n- btrfs: fix invalid attempt to free reserved space on failure to cow range (dependency for bsc#1031392).\n- btrfs: fix missing error return in btrfs_drop_snapshot (Git-fixes bsc#1109919).\n- btrfs: Fix race condition between delayed refs and blockgroup removal (Git-fixes bsc#1112263).\n- btrfs: Fix wrong btrfs_delalloc_release_extents parameter (bsc#1031392).\n- btrfs: kill trans in run_delalloc_nocow and btrfs_cross_ref_exist (dependency for bsc#1031392).\n- btrfs: make the delalloc block rsv per inode (dependency for bsc#1031392).\n- btrfs: pass delayed_refs directly to btrfs_find_delayed_ref_head (dependency for bsc#1031392).\n- btrfs: qgroup: Add quick exit for non-fs extents (dependency for bsc#1031392).\n- btrfs: qgroup: Cleanup btrfs_qgroup_prepare_account_extents function (dependency for bsc#1031392).\n- btrfs: qgroup: Cleanup the remaining old reservation counters (bsc#1031392).\n- btrfs: qgroup: Commit transaction in advance to reduce early EDQUOT (bsc#1031392).\n- btrfs: qgroup: Do not use root->qgroup_meta_rsv for qgroup (bsc#1031392).\n- btrfs: qgroup: Fix wrong qgroup reservation update for relationship modification (bsc#1031392).\n- btrfs: qgroup: Introduce function to convert META_PREALLOC into META_PERTRANS (bsc#1031392).\n- btrfs: qgroup: Introduce helpers to update and access new qgroup rsv (bsc#1031392).\n- btrfs: qgroup: Make qgroup_reserve and its callers to use separate reservation type (bsc#1031392).\n- btrfs: qgroup: Skeleton to support separate qgroup reservation type (bsc#1031392).\n- btrfs: qgroups: opencode qgroup_free helper (dependency for bsc#1031392).\n- btrfs: qgroup: Split meta rsv type into meta_prealloc and meta_pertrans (bsc#1031392).\n- btrfs: qgroup: Update trace events for metadata reservation (bsc#1031392).\n- btrfs: qgroup: Update trace events to use new separate rsv types (bsc#1031392).\n- btrfs: qgroup: Use independent and accurate per inode qgroup rsv (bsc#1031392).\n- btrfs: qgroup: Use root::qgroup_meta_rsv_* to record qgroup meta reserved space (bsc#1031392).\n- btrfs: qgroup: Use separate meta reservation type for delalloc (bsc#1031392).\n- btrfs: remove type argument from comp_tree_refs (dependency for bsc#1031392).\n- btrfs: rework outstanding_extents (dependency for bsc#1031392).\n- btrfs: switch args for comp_*_refs (dependency for bsc#1031392).\n- btrfs: Take trans lock before access running trans in check_delayed_ref (Follow up fixes for bsc#1031392).\n- ceph: avoid a use-after-free in ceph_destroy_options() (bsc#1112007).\n- cfg80211: fix a type issue in ieee80211_chandef_to_operating_class() (bnc#1012382).\n- cfg80211: nl80211_update_ft_ies() to validate NL80211_ATTR_IE (bnc#1012382).\n- cfq: Give a chance for arming slice idle timer in case of group_idle (bnc#1012382).\n- cgroup: Fix deadlock in cpu hotplug path (bnc#1012382).\n- cgroup, netclassid: add a preemption point to write_classid (bnc#1098996).\n- cifs: check for STATUS_USER_SESSION_DELETED (bsc#1112902).\n- cifs: connect to servername instead of IP for IPC$ share (bsc#1106359).\n- cifs: fix memory leak in SMB2_open() (bsc#1112894).\n- cifs: Fix use after free of a mid_q_entry (bsc#1112903).\n- cifs: fix wrapping bugs in num_entries() (bnc#1012382).\n- cifs: integer overflow in in SMB2_ioctl() (bsc#1012382).\n- cifs: prevent integer overflow in nxt_dir_entry() (bnc#1012382).\n- cifs: read overflow in is_valid_oplock_break() (bnc#1012382).\n- clk: imx6ul: fix missing of_node_put() (bnc#1012382).\n- clocksource/drivers/ti-32k: Add CLOCK_SOURCE_SUSPEND_NONSTOP flag for non-am43 SoCs (bnc#1012382).\n- config.sh: set BUGZILLA_PRODUCT for SLE12-SP3\n- coresight: Handle errors in finding input/output ports (bnc#1012382).\n- coresight: tpiu: Fix disabling timeouts (bnc#1012382).\n- cpu/hotplug: Fix SMT supported evaluation (bsc#1089343).\n- crypto: mxs-dcp - Fix wait logic on chan threads (bnc#1012382).\n- crypto: sharah - Unregister correct algorithms for SAHARA 3 (bnc#1012382).\n- crypto: skcipher - Fix -Wstringop-truncation warnings (bnc#1012382).\n- Define dependencies of in-kernel KMPs statically This allows us to use rpm's internal dependency generator (bsc#981083).\n- Define early_radix_enabled() (bsc#1094244).\n- dmaengine: pl330: fix irq race with terminate_all (bnc#1012382).\n- dm cache: fix resize crash if user does not reload cache table (bnc#1012382).\n- dm thin metadata: fix __udivdi3 undefined on 32-bit (bnc#1012382).\n- dm thin metadata: try to avoid ever aborting transactions (bnc#1012382).\n- Do not ship firmware (bsc#1054239). Pull firmware from kernel-firmware instead.\n- drivers: net: cpsw: fix parsing of phy-handle DT property in dual_emac config (bnc#1012382).\n- drivers: net: cpsw: fix segfault in case of bad phy-handle (bnc#1012382).\n- drivers/tty: add error handling for pcmcia_loop_config (bnc#1012382).\n- drm/amdgpu: Fix SDMA HQD destroy error on gfx_v7 (bnc#1012382).\n- drm/amdkfd: Fix error codes in kfd_get_process (bnc#1012382).\n- drm/nouveau/drm/nouveau: Use pm_runtime_get_noresume() in connector_detect() (bnc#1012382).\n- drm/nouveau/TBDdevinit: do not fail when PMU/PRE_OS is missing from VBIOS (bnc#1012382).\n- drm/nouveau: tegra: Detach from ARM DMA/IOMMU mapping (bnc#1012382).\n- drm/virtio: fix bounds check in virtio_gpu_cmd_get_capset() (bsc#1106929)\n- Drop dtb-source.spec and move the sources to kernel-source (bsc#1011920)\n- e1000: check on netif_running() before calling e1000_up() (bnc#1012382).\n- e1000: ensure to free old tx/rx rings in set_ringparam() (bnc#1012382).\n- ebtables: arpreply: Add the standard target sanity check (bnc#1012382).\n- edac, thunderx: Fix memory leak in thunderx_l2c_threaded_isr() (bsc#1114648).\n- ethernet: ti: davinci_emac: add missing of_node_put after calling of_parse_phandle (bnc#1012382).\n- ethtool: Remove trailing semicolon for static inline (bnc#1012382).\n- ethtool: restore erroneously removed break in dev_ethtool (bsc#1114229).\n- ext4: avoid divide by zero fault when deleting corrupted inline directories (bnc#1012382).\n- ext4: do not mark mmp buffer head dirty (bnc#1012382).\n- ext4: fix online resize's handling of a too-small final block group (bnc#1012382).\n- ext4: fix online resizing for bigalloc file systems with a 1k block size (bnc#1012382).\n- ext4: recalucate superblock checksum after updating free blocks/inodes (bnc#1012382).\n- f2fs: do not set free of current section (bnc#1012382).\n- f2fs: fix to do sanity check with {sit,nat}_ver_bitmap_bytesize (bnc#1012382).\n- fbdev: Distinguish between interlaced and progressive modes (bnc#1012382).\n- fbdev: fix broken menu dependencies (bsc#1106929)\n- fbdev/omapfb: fix omapfb_memory_read infoleak (bnc#1012382).\n- fbdev/via: fix defined but not used warning (bnc#1012382).\n- floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl (bnc#1012382).\n- fs/cifs: do not translate SFM_SLASH (U+F026) to backslash (bnc#1012382).\n- fs/cifs: suppress a string overflow warning (bnc#1012382).\n- fs/eventpoll: loosen irq-safety when possible (bsc#1096052).\n- gfs2: Special-case rindex for gfs2_grow (bnc#1012382).\n- gpio: adp5588: Fix sleep-in-atomic-context bug (bnc#1012382).\n- gpiolib: Mark gpio_suffixes array with __maybe_unused (bnc#1012382).\n- gpio: ml-ioh: Fix buffer underwrite on probe error path (bnc#1012382).\n- gpio: tegra: Move driver registration to subsys_init level (bnc#1012382).\n- gso_segment: Reset skb->mac_len after modifying network header (bnc#1012382).\n- hexagon: modify ffs() and fls() to return int (bnc#1012382).\n- hid: hid-ntrig: add error handling for sysfs_create_group (bnc#1012382).\n- hid: sony: Support DS4 dongle (bnc#1012382).\n- hid: sony: Update device ids (bnc#1012382).\n- hv: avoid crash in vmbus sysfs files (bnc#1108377).\n- hwmon: (adt7475) Make adt7475_read_word() return errors (bnc#1012382).\n- hwmon: (ina2xx) fix sysfs shunt resistor read access (bnc#1012382).\n- i2c: i2c-scmi: fix for i2c_smbus_write_block_data (bnc#1012382).\n- i2c: i801: Allow ACPI AML access I/O ports not reserved for SMBus (bnc#1012382).\n- i2c: i801: fix DNV's SMBCTRL register offset (bnc#1012382).\n- i2c: uniphier-f: issue STOP only for last message or I2C_M_STOP (bnc#1012382).\n- i2c: uniphier: issue STOP only for last message or I2C_M_STOP (bnc#1012382).\n- i2c: xiic: Make the start and the byte count write atomic (bnc#1012382).\n- i2c: xlp9xx: Add support for SMBAlert (bsc#1103308).\n- i2c: xlp9xx: Fix case where SSIF read transaction completes early (bsc#1103308).\n- i2c: xlp9xx: Fix issue seen when updating receive length (bsc#1103308).\n- i2c: xlp9xx: Make sure the transfer size is not more than I2C_SMBUS_BLOCK_SIZE (bsc#1103308).\n- ib/ipoib: Avoid a race condition between start_xmit and cm_rep_handler (bnc#1012382).\n- ib/srp: Avoid that sg_reset -d ${srp_device} triggers an infinite loop (bnc#1012382).\n- input: atakbd - fix Atari CapsLock behaviour (bnc#1012382).\n- input: atakbd - fix Atari keymap (bnc#1012382).\n- input: atmel_mxt_ts - only use first T9 instance (bnc#1012382).\n- input: elantech - enable middle button of touchpad on ThinkPad P72 (bnc#1012382).\n- iommu/amd: Return devid as alias for ACPI HID devices (bsc#1106105).\n- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bnc#1012382).\n- iommu/ipmmu-vmsa: Fix allocation in atomic context (bnc#1012382).\n- ip6_tunnel: be careful when accessing the inner header (bnc#1012382).\n- ipmi:ssif: Add support for multi-part transmit messages > 2 parts (bsc#1103308).\n- ip_tunnel: be careful when accessing the inner header (bnc#1012382).\n- ipv4: fix use-after-free in ip_cmsg_recv_dstaddr() (bnc#1012382).\n- ipv6: fix possible use-after-free in ip6_xmit() (bnc#1012382).\n- iw_cxgb4: only allow 1 flush on user qps (bnc#1012382).\n- ixgbe: pci_set_drvdata must be called before register_netdev (Git-fixes bsc#1109923).\n- jffs2: return -ERANGE when xattr buffer is too small (bnc#1012382).\n- KABI: move the new handler to end of machdep_calls and hide it from genksyms (bsc#1094244).\n- kABI: protect struct hnae_desc_cb (kabi).\n- kbuild: add .DELETE_ON_ERROR special target (bnc#1012382).\n- kernel-obs-build.spec.in: add --no-hostonly-cmdline to dracut invocation (boo#1062303). call dracut with --no-hostonly-cmdline to avoid the random rootfs UUID being added into the initrd's /etc/cmdline.d/95root-dev.conf\n- kernel-obs-build: use pae and lpae kernels where available (bsc#1073579).\n- kernel/params.c: downgrade warning for unsafe parameters (bsc#1050549).\n- kprobes/x86: Release insn_slot in failure path (bsc#1110006).\n- kthread: fix boot hang (regression) on MIPS/OpenRISC (bnc#1012382).\n- kthread: Fix use-after-free if kthread fork fails (bnc#1012382).\n- kvm: nVMX: Do not expose MPX VMX controls when guest MPX disabled (bsc#1106240).\n- kvm: nVMX: Do not flush TLB when vmcs12 uses VPID (bsc#1106240).\n- kvm: PPC: Book3S HV: Do not truncate HPTE index in xlate function (bnc#1012382).\n- kvm: x86: Do not re-{try,execute} after failed emulation in L2 (bsc#1106240).\n- kvm: x86: Do not use kvm_x86_ops->mpx_supported() directly (bsc#1106240).\n- kvm: x86: fix APIC page invalidation (bsc#1106240).\n- kvm: x86: remove eager_fpu field of struct kvm_vcpu_arch (bnc#1012382).\n- kvm/x86: remove WARN_ON() for when vm_munmap() fails (bsc#1106240).\n- kvm: x86: SVM: Call x86_spec_ctrl_set_guest/host() with interrupts disabled (bsc#1106240).\n- lib/test_hexdump.c: fix failure on big endian cpu (bsc#1106110).\n- locking/osq_lock: Fix osq_lock queue corruption (bnc#1012382).\n- locking/rwsem-xadd: Fix missed wakeup due to reordering of load (bnc#1012382).\n- lpfc: fixup crash in lpfc_els_unsol_buffer() (bsc#1107318).\n- mac80211: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bnc#1012382).\n- mac80211: fix a race between restart and CSA flows (bnc#1012382).\n- mac80211: fix setting IEEE80211_KEY_FLAG_RX_MGMT for AP mode keys (bnc#1012382).\n- mac80211: Fix station bandwidth setting after channel switch (bnc#1012382).\n- mac80211_hwsim: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bnc#1012382).\n- mac80211: mesh: fix HWMP sequence numbering to follow standard (bnc#1012382).\n- mac80211: restrict delayed tailroom needed decrement (bnc#1012382).\n- mac80211: shorten the IBSS debug messages (bnc#1012382).\n- mach64: detect the dot clock divider correctly on sparc (bnc#1012382).\n- macintosh/via-pmu: Add missing mmio accessors (bnc#1012382).\n- macros.kernel-source: define linux_arch for KMPs (boo#1098050). CONFIG_64BIT is no longer defined so KMP spec files need to include %{?linux_make_arch} in any make call to build modules or descent into the kernel directory for any reason.\n- macros.kernel-source: pass -b properly in kernel module package (bsc#1107870).\n- macros.kernel-source: pass -f properly in module subpackage (boo#1076393).\n- md-cluster: clear another node's suspend_area after the copy is finished (bnc#1012382).\n- md/raid1: exit sync request if MD_RECOVERY_INTR is set (git-fixes).\n- md/raid5: fix data corruption of replacements after originals dropped (bnc#1012382).\n- media: af9035: prevent buffer overflow on write (bnc#1012382).\n- media: exynos4-is: Prevent NULL pointer dereference in __isp_video_try_fmt() (bnc#1012382).\n- media: fsl-viu: fix error handling in viu_of_probe() (bnc#1012382).\n- media: omap3isp: zero-initialize the isp cam_xclk{a,b} initial data (bnc#1012382).\n- media: omap_vout: Fix a possible null pointer dereference in omap_vout_open() (bsc#1050431).\n- media: s3c-camif: ignore -ENOIOCTLCMD from v4l2_subdev_call for s_power (bnc#1012382).\n- media: soc_camera: ov772x: correct setting of banding filter (bnc#1012382).\n- media: tm6000: add error handling for dvb_register_adapter (bnc#1012382).\n- media: uvcvideo: Support realtek's UVC 1.5 device (bnc#1012382).\n- media: v4l: event: Prevent freeing event subscriptions while accessed (bnc#1012382).\n- media: videobuf2-core: check for q->error in vb2_core_qbuf() (bnc#1012382).\n- media: videobuf-dma-sg: Fix dma_{sync,unmap}_sg() calls (bsc#1050431).\n- mei: bus: type promotion bug in mei_nfc_if_version() (bnc#1012382).\n- memory_hotplug: cond_resched in __remove_pages (bnc#1114178).\n- mfd: omap-usb-host: Fix dts probe of children (bnc#1012382).\n- mfd: ti_am335x_tscadc: Fix struct clk memory leak (bnc#1012382).\n- misc: hmc6352: fix potential Spectre v1 (bnc#1012382).\n- misc: mic: SCIF Fix scif_get_new_port() error handling (bnc#1012382).\n- misc: ti-st: Fix memory leak in the error path of probe() (bnc#1012382).\n- mmc: mmci: stop building qcom dml as module (bsc#1110468).\n- mm: fix devmem_is_allowed() for sub-page System RAM intersections (bsc#1110006).\n- mm: get rid of vmacache_flush_all() entirely (bnc#1012382).\n- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (bnc#1012382).\n- mm: /proc/pid/pagemap: hide swap entries from unprivileged users (Git-fixes bsc#1109907).\n- mm: shmem.c: Correctly annotate new inodes for lockdep (bnc#1012382).\n- mm/vmstat.c: fix outdated vmstat_text (bnc#1012382).\n- mm/vmstat.c: skip NR_TLB_REMOTE_FLUSH* properly (bnc#1012382).\n- mm/vmstat.c: skip NR_TLB_REMOTE_FLUSH* properly (git fixes).\n- module: exclude SHN_UNDEF symbols from kallsyms api (bnc#1012382).\n- mtdchar: fix overflows in adjustment of `count` (bnc#1012382).\n- mtd/maps: fix solutionengine.c printk format warnings (bnc#1012382).\n- neighbour: confirm neigh entries when ARP packet is received (bnc#1012382).\n- net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT (bnc#1012382).\n- net: cadence: Fix a sleep-in-atomic-context bug in macb_halt_tx() (bnc#1012382).\n- net: dcb: For wild-card lookups, use priority -1, not 0 (bnc#1012382).\n- net: ethernet: mvneta: Fix napi structure mixup on armada 3700 (bsc#1110616).\n- net: ethernet: ti: cpsw: fix mdio device reference leak (bnc#1012382).\n- netfilter: x_tables: avoid stack-out-of-bounds read in xt_copy_counters_from_user (bnc#1012382).\n- net: hns: fix length and page_offset overflow when CONFIG_ARM64_64K_PAGES (bnc#1012382).\n- net: hp100: fix always-true check for link up state (bnc#1012382).\n- net: ipv4: update fnhe_pmtu when first hop's MTU changes (bnc#1012382).\n- net/ipv6: Display all addresses in output of /proc/net/if_inet6 (bnc#1012382).\n- netlabel: check for IPV4MASK in addrinfo_get (bnc#1012382).\n- net: macb: disable scatter-gather for macb on sama5d3 (bnc#1012382).\n- net/mlx4: Use cpumask_available for eq->affinity_mask (bnc#1012382).\n- net: mvneta: fix mtu change on port without link (bnc#1012382).\n- net: mvneta: fix mvneta_config_rss on armada 3700 (bsc#1110615).\n- net: mvpp2: Extract the correct ethtype from the skb for tx csum offload (bnc#1012382).\n- net: systemport: Fix wake-up interrupt race during resume (bnc#1012382).\n- net/usb: cancel pending work when unbinding smsc75xx (bnc#1012382).\n- nfc: Fix possible memory corruption when handling SHDLC I-Frame commands (bnc#1012382).\n- nfc: Fix the number of pipes (bnc#1012382).\n- nfs: add nostatflush mount option (bsc#1065726).\n- nfs: Avoid quadratic search when freeing delegations (bsc#1084760).\n- nfsd: fix corrupted reply to badly ordered compound (bnc#1012382).\n- nfs: Use an appropriate work queue for direct-write completion (bsc#1082519).\n- nfsv4.0 fix client reference leak in callback (bnc#1012382).\n- ocfs2: fix locking for res->tracking and dlm->tracking_list (bnc#1012382).\n- ocfs2: fix ocfs2 read block panic (bnc#1012382).\n- of: unittest: Disable interrupt node tests for old world MAC systems (bnc#1012382).\n- ovl: Copy inode attributes after setting xattr (bsc#1107299).\n- parport: sunbpp: fix error return code (bnc#1012382).\n- partitions/aix: append null character to print data from disk (bnc#1012382).\n- partitions/aix: fix usage of uninitialized lv_info and lvname structures (bnc#1012382).\n- Pass x86 as architecture on x86_64 and i386 (bsc#1093118).\n- pci: altera: Fix bool initialization in tlp_read_packet() (bsc#1109806).\n- pci: designware: Fix I/O space page leak (bsc#1109806).\n- pci: designware: Fix pci_remap_iospace() failure path (bsc#1109806).\n- pci: hv: Use effective affinity mask (bsc#1109772).\n- pci: OF: Fix I/O space page leak (bsc#1109806).\n- pci: pciehp: Fix unprotected list iteration in IRQ handler (bsc#1109806).\n- pci: Reprogram bridge prefetch registers on resume (bnc#1012382).\n- pci: shpchp: Fix AMD POGO identification (bsc#1109806).\n- pci: Supply CPU physical address (not bus address) to iomem_is_exclusive() (bsc#1109806).\n- pci: versatile: Fix I/O space page leak (bsc#1109806).\n- pci: versatile: Fix pci_remap_iospace() failure path (bsc#1109806).\n- pci: xgene: Fix I/O space page leak (bsc#1109806).\n- pci: xilinx: Add missing of_node_put() (bsc#1109806).\n- perf powerpc: Fix callchain ip filtering (bnc#1012382).\n- perf powerpc: Fix callchain ip filtering when return address is in a register (bnc#1012382).\n- perf probe powerpc: Ignore SyS symbols irrespective of endianness (bnc#1012382).\n- perf script python: Fix export-to-postgresql.py occasional failure (bnc#1012382).\n- perf tools: Allow overriding MAX_NR_CPUS at compile time (bnc#1012382).\n- phy: qcom-ufs: add MODULE_LICENSE tag (bsc#1110468).\n- pinctrl: qcom: spmi-gpio: Fix pmic_gpio_config_get() to be compliant (bnc#1012382).\n- pipe: actually allow root to exceed the pipe buffer limit (git-fixes).\n- platform/x86: alienware-wmi: Correct a memory leak (bnc#1012382).\n- platform/x86: toshiba_acpi: Fix defined but not used build warnings (bnc#1012382).\n- pm / core: Clear the direct_complete flag on errors (bnc#1012382).\n- powerpc/64s: move machine check SLB flushing to mm/slb.c (bsc#1094244).\n- powerpc/kdump: Handle crashkernel memory reservation failure (bnc#1012382).\n- powerpc/mce: Fix SLB rebolting during MCE recovery path (bsc#1094244).\n- powerpc/numa: Skip onlining a offline node in kdump path (bsc#1109784).\n- powerpc/numa: Use associativity if VPHN hcall is successful (bsc#1110363).\n- powerpc/perf/hv-24x7: Fix passing of catalog version number (bsc#1053043).\n- powerpc/powernv: opal_put_chars partial write fix (bnc#1012382).\n- powerpc/pseries: Defer the logging of rtas error to irq work queue (bsc#1094244).\n- powerpc/pseries: Define MCE error event section (bsc#1094244).\n- powerpc/pseries: Display machine check error details (bsc#1094244).\n- powerpc/pseries: Dump the SLB contents on SLB MCE errors (bsc#1094244).\n- powerpc/pseries: Fix build break for SPLPAR=n and CPU hotplug (bsc#1079524, git-fixes).\n- powerpc/pseries: Fix CONFIG_NUMA=n build (bsc#1067906, git-fixes).\n- powerpc/pseries: Flush SLB contents on SLB MCE errors (bsc#1094244).\n- powerpc/pseries/mm: call H_BLOCK_REMOVE (bsc#1109158).\n- powerpc/pseries/mm: factorize PTE slot computation (bsc#1109158).\n- powerpc/pseries/mm: Introducing FW_FEATURE_BLOCK_REMOVE (bsc#1109158).\n- powerpc/rtas: Fix a potential race between CPU-Offline & Migration (bsc#1111870).\n- powerpc/tm: Avoid possible userspace r1 corruption on reclaim (bsc#1109333).\n- power: vexpress: fix corruption in notifier registration (bnc#1012382).\n- printk: do not spin in printk when in nmi (bsc#1094244).\n- proc: restrict kernel stack dumps to root (bnc#1012382).\n- pstore: Fix incorrect persistent ram buffer mapping (bnc#1012382).\n- qlcnic: fix Tx descriptor corruption on 82xx devices (bnc#1012382).\n- r8169: Clear RTL_FLAG_TASK_*_PENDING when clearing RTL_FLAG_TASK_ENABLED (bnc#1012382).\n- raid10 BUG_ON in raise_barrier when force is true and conf->barrier is 0 (bnc#1012382).\n- rculist: add list_for_each_entry_from_rcu() (bsc#1084760).\n- rculist: Improve documentation for list_for_each_entry_from_rcu() (bsc#1084760).\n- rdma/cma: Do not ignore net namespace for unbound cm_id (bnc#1012382).\n- rdma/cma: Protect cma dev list with lock (bnc#1012382).\n- rdma/ucma: check fd type in ucma_migrate_id() (bnc#1012382).\n- reiserfs: add check to detect corrupted directory entry (bsc#1109818).\n- reiserfs: do not panic on bad directory entries (bsc#1109818).\n- resource: Include resource end in walk_*() interfaces (bsc#1114648).\n- Revert 'btrfs: qgroups: Retry after commit on getting EDQUOT' (bsc#1031392).\n- Revert 'dma-buf/sync-file: Avoid enable fence signaling if poll(.timeout=0)' (bsc#1111363).\n- Revert 'drm: Do not pass negative delta to ktime_sub_ns()' (bsc#1106929)\n- Revert 'drm/i915: Initialize HWS page address after GPU reset' (bsc#1106929)\n- Revert 'Drop kernel trampoline stack.' This reverts commit 85dead31706c1c1755adff90405ff9861c39c704.\n- Revert 'kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)' This reverts commit edde1f21880e3bfe244c6f98a3733b05b13533dc.\n- Revert 'kvm: x86: remove eager_fpu field of struct kvm_vcpu_arch' (kabi).\n- Revert 'media: v4l: event: Prevent freeing event subscriptions while accessed' (kabi).\n- Revert 'mm: get rid of vmacache_flush_all() entirely' (kabi).\n- Revert 'NFC: Fix the number of pipes' (kabi).\n- Revert 'proc: restrict kernel stack dumps to root' (kabi).\n- Revert 'Skip intel_crt_init for Dell XPS 8700' (bsc#1106929)\n- Revert 'tcp: add tcp_ooo_try_coalesce() helper' (kabi).\n- Revert 'tcp: call tcp_drop() from tcp_data_queue_ofo()' (kabi).\n- Revert 'tcp: fix a stale ooo_last_skb after a replace' (kabi).\n- Revert 'tcp: free batches of packets in tcp_prune_ofo_queue()' (kabi).\n- Revert 'tcp: use an RB tree for ooo receive queue' (kabi).\n- Revert 'usb: cdc-wdm: Fix a sleep-in-atomic-context bug in service_outstanding_interrupt()' (bnc#1012382).\n- Revert 'x86/fpu: Finish excising 'eagerfpu'' (kabi).\n- Revert 'x86/fpu: Remove struct fpu::counter' (kabi).\n- Revert 'x86/fpu: Remove use_eager_fpu()' (kabi).\n- ring-buffer: Allow for rescheduling when removing pages (bnc#1012382).\n- rndis_wlan: potential buffer overflow in rndis_wlan_auth_indication() (bnc#1012382).\n- rpm/kernel-binary.spec.in: Check module licenses (bsc#1083215,bsc#1083527)\n- rpm/kernel-binary.spec.in: Do not sign modules if CONFIG_MODULE_SIG=n (bsc#1035053)\n- rpm/kernel-binary.spec.in: Obsolete ftsteutates KMP (boo#997172)\n- rpm/kernel-binary.spec.in: Only kernel-syzkaller needs gcc-devel (boo#1043591).\n- rpm/kernel-docs.spec.in: Expand kernel tree directly from sources (bsc#1057199)\n- rpm/kernel-docs.spec.in: Fix and cleanup for 4.13 doc build (bsc#1048129) The whole DocBook stuff has been deleted. The PDF build still non-working thus the sub-packaging disabled so far.\n- rpm/kernel-docs.spec.in: refresh dependencies for PDF build (bsc#1048129) But it still does not work with Tex Live 2017, thus disabled yet. Also add texlive-anyfontsize for HTML math handling.\n- rpm/kernel-module-subpackage: Generate proper supplements in the template ... instead of relying on find-provides.ksyms to do it (bsc#981083).\n- rpm/kernel-source.spec.in: Do not list deleted depdendency helpers (bsc#981083).\n- rpm/kernel-spec-macros: Try harder to detect Build Service environment (bsc#1078788)\n- rtc: bq4802: add error handling for devm_ioremap (bnc#1012382).\n- rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096 (bnc#1012382).\n- s390/chsc: Add exception handler for CHSC instruction (git-fixes).\n- s390/extmem: fix gcc 8 stringop-overflow warning (bnc#1012382).\n- s390/facilites: use stfle_fac_list array size for MAX_FACILITY_BIT (bnc#1108315, LTC#171326).\n- s390/kdump: Fix elfcorehdr size calculation (git-fixes).\n- s390/kdump: Make elfcorehdr size calculation ABI compliant (git-fixes).\n- s390/mm: correct allocate_pgste proc_handler callback (git-fixes).\n- s390/qeth: do not dump past end of unknown HW header (bnc#1012382).\n- s390/qeth: fix race in used-buffer accounting (bnc#1012382).\n- s390/qeth: handle failure on workqueue creation (git-fixes).\n- s390/qeth: reset layer2 attribute on layer switch (bnc#1012382).\n- s390/qeth: use vzalloc for QUERY OAT buffer (bnc#1108315, LTC#171527).\n- s390: revert ELF_ET_DYN_BASE base changes (git-fixes).\n- s390/stacktrace: fix address ranges for asynchronous and panic stack (git-fixes).\n- sched/fair: Fix bandwidth timer clock drift condition (Git-fixes).\n- sched/fair: Fix vruntime_normalized() for remote non-migration wakeup (Git-fixes).\n- scsi: 3ware: fix return 0 on the error path of probe (bnc#1012382).\n- scsi: bnx2i: add error handling for ioremap_nocache (bnc#1012382).\n- scsi: ibmvscsi: Improve strings handling (bnc#1012382).\n- scsi: klist: Make it safe to use klists in atomic context (bnc#1012382).\n- scsi: target: fix __transport_register_session locking (bnc#1012382).\n- scsi: target/iscsi: Make iscsit_ta_authentication() respect the output buffer size (bnc#1012382).\n- selftests/efivarfs: add required kernel configs (bnc#1012382).\n- selftest: timers: Tweak raw_skew to SKIP when ADJ_OFFSET/other clock adjustments are in progress (bnc#1012382).\n- selinux: use GFP_NOWAIT in the AVC kmem_caches (bnc#1012382).\n- serial: cpm_uart: return immediately from console poll (bnc#1012382).\n- serial: imx: restore handshaking irq for imx1 (bnc#1012382).\n- signal: Properly deliver SIGSEGV from x86 uprobes (bsc#1110006).\n- slub: make ->cpu_partial unsigned int (bnc#1012382).\n- smb2: fix missing files in root share directory listing (bnc#1012382).\n- smb3: fill in statfs fsid and correct namelen (bsc#1112905).\n- sound: enable interrupt after dma buffer initialization (bnc#1012382).\n- spi: rspi: Fix interrupted DMA transfers (bnc#1012382).\n- spi: rspi: Fix invalid SPI use during system suspend (bnc#1012382).\n- spi: sh-msiof: Fix handling of write value for SISTR register (bnc#1012382).\n- spi: sh-msiof: Fix invalid SPI use during system suspend (bnc#1012382).\n- spi: tegra20-slink: explicitly enable/disable clock (bnc#1012382).\n- srcu: Allow use of Tiny/Tree SRCU from both process and interrupt context (bsc#1050549).\n- staging: android: ashmem: Fix mmap size validation (bnc#1012382).\n- staging: rt5208: Fix a sleep-in-atomic bug in xd_copy_page (bnc#1012382).\n- staging: rts5208: fix missing error check on call to rtsx_write_register (bnc#1012382).\n- staging/rts5208: Fix read overflow in memcpy (bnc#1012382).\n- stmmac: fix valid numbers of unicast filter entries (bnc#1012382).\n- stop_machine: Atomically queue and wake stopper threads (git-fixes).\n- target: log Data-Out timeouts as errors (bsc#1095805).\n- target: log NOP ping timeouts as errors (bsc#1095805).\n- target: split out helper for cxn timeout error stashing (bsc#1095805).\n- target: stash sess_err_stats on Data-Out timeout (bsc#1095805).\n- target: use ISCSI_IQN_LEN in iscsi_target_stat (bsc#1095805).\n- tcp: add tcp_ooo_try_coalesce() helper (bnc#1012382).\n- tcp: call tcp_drop() from tcp_data_queue_ofo() (bnc#1012382).\n- tcp: fix a stale ooo_last_skb after a replace (bnc#1012382).\n- tcp: free batches of packets in tcp_prune_ofo_queue() (bnc#1012382).\n- tcp: increment sk_drops for dropped rx packets (bnc#1012382).\n- tcp: use an RB tree for ooo receive queue (bnc#1012382).\n- team: Forbid enslaving team device to itself (bnc#1012382).\n- thermal: of-thermal: disable passive polling when thermal zone is disabled (bnc#1012382).\n- Tools: hv: Fix a bug in the key delete code (bnc#1012382).\n- tools/vm/page-types.c: fix 'defined but not used' warning (bnc#1012382).\n- tools/vm/slabinfo.c: fix sign-compare warning (bnc#1012382).\n- tpm: Restore functionality to xen vtpm driver (bsc#1020645, git-fixes).\n- tsl2550: fix lux1_input error in low light (bnc#1012382).\n- tty: Drop tty->count on tty_reopen() failure (bnc#1105428).\n- tty: rocket: Fix possible buffer overwrite on register_PCI (bnc#1012382).\n- tty: vt_ioctl: fix potential Spectre v1 (bnc#1012382).\n- ubifs: Check for name being NULL while mounting (bnc#1012382).\n- ucma: fix a use-after-free in ucma_resolve_ip() (bnc#1012382).\n- uio: potential double frees if __uio_register_device() fails (bnc#1012382).\n- usb: add quirk for WORLDE Controller KS49 or Prodipe MIDI 49C USB controller (bnc#1012382).\n- usb: Add quirk to support DJI CineSSD (bnc#1012382).\n- usb: Avoid use-after-free by flushing endpoints early in usb_set_interface() (bnc#1012382).\n- usb: cdc-wdm: Fix a sleep-in-atomic-context bug in service_outstanding_interrupt() (bnc#1012382).\n- usb: Do not die twice if PCI xhci host is not responding in resume (bnc#1012382).\n- usb: fix error handling in usb_driver_claim_interface() (bnc#1012382).\n- usb: gadget: fotg210-udc: Fix memory leak of fotg210->ep[i] (bnc#1012382).\n- usb: gadget: serial: fix oops when data rx'd after close (bnc#1012382).\n- usb: handle NULL config in usb_find_alt_setting() (bnc#1012382).\n- usb: host: u132-hcd: Fix a sleep-in-atomic-context bug in u132_get_frame() (bnc#1012382).\n- usb: misc: uss720: Fix two sleep-in-atomic-context bugs (bnc#1012382).\n- usb: net2280: Fix erroneous synchronization change (bnc#1012382).\n- usb: remove LPM management from usb_driver_claim_interface() (bnc#1012382).\n- usb: serial: io_ti: fix array underflow in completion handler (bnc#1012382).\n- usb: serial: kobil_sct: fix modem-status error handling (bnc#1012382).\n- usb: serial: simple: add Motorola Tetra MTP6550 id (bnc#1012382).\n- usb: serial: ti_usb_3410_5052: fix array underflow in completion handler (bnc#1012382).\n- usb: usbdevfs: restore warning for nonsensical flags (bnc#1012382).\n- usb: usbdevfs: sanitize flags more (bnc#1012382).\n- usb: wusbcore: security: cast sizeof to int for comparison (bnc#1012382).\n- usb: yurex: Check for truncation in yurex_read() (bnc#1012382).\n- usb: yurex: Fix buffer over-read in yurex_write() (bnc#1012382).\n- Use upstream version of pci-hyperv change 35a88a18d7\n- uwb: hwa-rc: fix memory leak at probe (bnc#1012382).\n- vfs: do not test owner for NFS in set_posix_acl() (bsc#1103405).\n- video: goldfishfb: fix memory leak on driver remove (bnc#1012382).\n- vmci: type promotion bug in qp_host_get_user_memory() (bnc#1012382).\n- vmw_balloon: include asm/io.h (bnc#1012382).\n- watchdog: w83627hf: Added NCT6102D support (bsc#1106434).\n- wlcore: Add missing PM call for wlcore_cmd_wait_for_event_or_timeout() (bnc#1012382).\n- wlcore: Fix memory leak in wlcore_cmd_wait_for_event_or_timeout (git-fixes).\n- x86/apic: Fix restoring boot IRQ mode in reboot and kexec/kdump (bsc#1110006).\n- x86/apic: Split disable_IO_APIC() into two functions to fix CONFIG_KEXEC_JUMP=y (bsc#1110006).\n- x86/apic: Split out restore_boot_irq_mode() from disable_IO_APIC() (bsc#1110006).\n- x86/boot: Fix 'run_size' calculation (bsc#1110006).\n- x86/cpufeature: deduplicate X86_FEATURE_L1TF_PTEINV (kabi).\n- x86/entry/64: Add two more instruction suffixes (bnc#1012382).\n- x86/entry/64: Clear registers for exceptions/interrupts, to reduce speculation attack surface (bsc#1105931).\n- x86/entry/64: sanitize extra registers on syscall entry (bsc#1105931).\n- x86/fpu: Finish excising 'eagerfpu' (bnc#1012382).\n- x86/fpu: Remove second definition of fpu in __fpu__restore_sig() (bsc#1110006).\n- x86/fpu: Remove struct fpu::counter (bnc#1012382).\n- x86/fpu: Remove use_eager_fpu() (bnc#1012382).\n- x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772).\n- x86/kaiser: Avoid loosing NMIs when using trampoline stack (bsc#1106293 bsc#1099597).\n- x86/mm: Remove in_nmi() warning from vmalloc_fault() (bnc#1012382).\n- x86: msr-index.h: Correct SNB_C1/C3_AUTO_UNDEMOTE defines (bsc#1110006).\n- x86/numa_emulation: Fix emulated-to-physical node mapping (bnc#1012382).\n- x86/paravirt: Fix some warning messages (bnc#1065600).\n- x86/percpu: Fix this_cpu_read() (bsc#1110006).\n- x86,sched: Allow topologies where NUMA nodes share an LLC (bsc#1091158, bsc#1101555).\n- x86/spec_ctrl: Fix spec_ctrl reporting (bsc#1106913, bsc#1111516).\n- x86/speculation: Apply IBPB more strictly to avoid cross-process data leak (bsc#1106913).\n- x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation (bsc#1106913).\n- x86/speculation: Propagate information about RSB filling mitigation to sysfs (bsc#1106913).\n- x86/time: Correct the attribute on jiffies' definition (bsc#1110006).\n- x86/tsc: Add missing header to tsc_msr.c (bnc#1012382).\n- x86/vdso: Fix asm constraints on vDSO syscall fallbacks (bsc#1110006).\n- x86/vdso: Fix vDSO build if a retpoline is emitted (bsc#1110006).\n- x86/vdso: Fix vDSO syscall fallback asm constraint regression (bsc#1110006).\n- x86/vdso: Only enable vDSO retpolines when enabled and supported (bsc#1110006).\n- xen: avoid crash in disable_hotplug_cpu (bnc#1012382 bsc#1106594 bsc#1042422).\n- xen: fix GCC warning and remove duplicate EVTCHN_ROW/EVTCHN_COL usage (bnc#1012382).\n- xen: issue warning message when out of grant maptrack entries (bsc#1105795).\n- xen/manage: do not complain about an empty value in control/sysrq node (bnc#1012382).\n- xen/netfront: do not bug in case of too many frags (bnc#1012382).\n- xen-netfront: fix queue name setting (bnc#1012382).\n- xen/netfront: fix waiting for xenbus state change (bnc#1012382).\n- xen-netfront: fix warn message as irq device name has '/' (bnc#1012382).\n- xen/x86/vpmu: Zero struct pt_regs before calling into sample handling code (bnc#1012382).\n- xfrm: fix 'passing zero to ERR_PTR()' warning (bnc#1012382).\n- xhci: Add missing CAS workaround for Intel Sunrise Point xHCI (bnc#1012382).\n- xhci: Do not print a warning when setting link state for disabled ports (bnc#1012382).\n- x86/kexec: Correct KEXEC_BACKUP_SRC_END off-by-one error (bsc#1114648).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-DESKTOP-12-SP3-2018-2621,SUSE-SLE-HA-12-SP3-2018-2621,SUSE-SLE-SDK-12-SP3-2018-2621,SUSE-SLE-SERVER-12-SP3-2018-2621,SUSE-SLE-WE-12-SP3-2018-2621", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3689-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:3689-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183689-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:3689-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-November/004844.html", }, { category: "self", summary: "SUSE Bug 1011920", url: "https://bugzilla.suse.com/1011920", }, { category: "self", summary: "SUSE Bug 1012382", url: "https://bugzilla.suse.com/1012382", }, { category: "self", summary: "SUSE Bug 1012422", url: "https://bugzilla.suse.com/1012422", }, { category: "self", summary: "SUSE Bug 1020645", url: "https://bugzilla.suse.com/1020645", }, { category: "self", summary: "SUSE Bug 1031392", url: "https://bugzilla.suse.com/1031392", }, { category: "self", summary: "SUSE Bug 1035053", url: "https://bugzilla.suse.com/1035053", }, { category: "self", summary: "SUSE Bug 1042422", url: "https://bugzilla.suse.com/1042422", }, { category: "self", summary: "SUSE Bug 1043591", url: "https://bugzilla.suse.com/1043591", }, { category: "self", summary: "SUSE Bug 1048129", url: "https://bugzilla.suse.com/1048129", }, { category: "self", summary: "SUSE Bug 1050431", url: "https://bugzilla.suse.com/1050431", }, { category: "self", summary: "SUSE Bug 1050549", url: "https://bugzilla.suse.com/1050549", }, { category: "self", summary: "SUSE Bug 1053043", url: "https://bugzilla.suse.com/1053043", }, { category: "self", summary: "SUSE Bug 1054239", url: "https://bugzilla.suse.com/1054239", }, { category: "self", summary: "SUSE Bug 1057199", url: "https://bugzilla.suse.com/1057199", }, { category: "self", summary: "SUSE Bug 1065600", url: "https://bugzilla.suse.com/1065600", }, { category: "self", summary: "SUSE Bug 1065726", url: "https://bugzilla.suse.com/1065726", }, { category: "self", summary: "SUSE Bug 1067906", url: "https://bugzilla.suse.com/1067906", }, { category: "self", summary: "SUSE Bug 1073579", url: "https://bugzilla.suse.com/1073579", }, { category: "self", summary: "SUSE Bug 1076393", url: "https://bugzilla.suse.com/1076393", }, { category: "self", summary: "SUSE Bug 1078788", url: "https://bugzilla.suse.com/1078788", }, { category: "self", summary: "SUSE Bug 1079524", url: "https://bugzilla.suse.com/1079524", }, { category: "self", summary: "SUSE Bug 1082519", url: "https://bugzilla.suse.com/1082519", }, { category: "self", summary: "SUSE Bug 1083215", url: "https://bugzilla.suse.com/1083215", }, { category: "self", summary: "SUSE Bug 1083527", url: "https://bugzilla.suse.com/1083527", }, { category: "self", summary: "SUSE Bug 1084760", url: "https://bugzilla.suse.com/1084760", }, { category: "self", summary: "SUSE Bug 1089343", url: "https://bugzilla.suse.com/1089343", }, { category: "self", summary: "SUSE Bug 1091158", url: "https://bugzilla.suse.com/1091158", }, { category: "self", summary: "SUSE Bug 1093118", url: "https://bugzilla.suse.com/1093118", }, { category: "self", summary: "SUSE Bug 1094244", url: "https://bugzilla.suse.com/1094244", }, { category: "self", summary: "SUSE Bug 1094825", url: "https://bugzilla.suse.com/1094825", }, { category: "self", summary: "SUSE Bug 1095805", url: "https://bugzilla.suse.com/1095805", }, { category: "self", summary: "SUSE Bug 1096052", url: "https://bugzilla.suse.com/1096052", }, { category: "self", summary: "SUSE Bug 1098050", url: "https://bugzilla.suse.com/1098050", }, { category: "self", summary: "SUSE Bug 1098996", url: "https://bugzilla.suse.com/1098996", }, { category: "self", summary: "SUSE Bug 1099597", url: "https://bugzilla.suse.com/1099597", }, { category: "self", summary: "SUSE Bug 1101555", url: "https://bugzilla.suse.com/1101555", }, { category: "self", summary: "SUSE Bug 1103308", url: "https://bugzilla.suse.com/1103308", }, { category: "self", summary: "SUSE Bug 1103405", url: "https://bugzilla.suse.com/1103405", }, { category: "self", summary: "SUSE Bug 1104124", url: "https://bugzilla.suse.com/1104124", }, { category: "self", summary: "SUSE Bug 1105025", url: "https://bugzilla.suse.com/1105025", }, { category: "self", summary: "SUSE Bug 1105428", url: "https://bugzilla.suse.com/1105428", }, { category: "self", summary: "SUSE Bug 1105795", url: "https://bugzilla.suse.com/1105795", }, { category: "self", summary: "SUSE Bug 1105931", url: "https://bugzilla.suse.com/1105931", }, { category: "self", summary: "SUSE Bug 1106105", url: "https://bugzilla.suse.com/1106105", }, { category: "self", summary: "SUSE Bug 1106110", url: "https://bugzilla.suse.com/1106110", }, { category: "self", summary: "SUSE Bug 1106240", url: "https://bugzilla.suse.com/1106240", }, { category: "self", summary: "SUSE Bug 1106293", url: "https://bugzilla.suse.com/1106293", }, { category: "self", summary: "SUSE Bug 1106359", url: "https://bugzilla.suse.com/1106359", }, { category: "self", summary: "SUSE Bug 1106434", url: "https://bugzilla.suse.com/1106434", }, { category: "self", summary: "SUSE Bug 1106594", url: "https://bugzilla.suse.com/1106594", }, { category: "self", summary: "SUSE Bug 1106913", url: "https://bugzilla.suse.com/1106913", }, { category: "self", summary: "SUSE Bug 1106929", url: "https://bugzilla.suse.com/1106929", }, { category: "self", summary: "SUSE Bug 1107060", url: "https://bugzilla.suse.com/1107060", }, { category: "self", summary: "SUSE Bug 1107299", url: "https://bugzilla.suse.com/1107299", }, { category: "self", summary: "SUSE Bug 1107318", url: "https://bugzilla.suse.com/1107318", }, { category: "self", summary: "SUSE Bug 1107535", url: "https://bugzilla.suse.com/1107535", }, { category: "self", summary: "SUSE Bug 1107829", url: "https://bugzilla.suse.com/1107829", }, { category: "self", summary: "SUSE Bug 1107870", url: "https://bugzilla.suse.com/1107870", }, { category: "self", summary: "SUSE Bug 1108315", url: "https://bugzilla.suse.com/1108315", }, { category: "self", summary: "SUSE Bug 1108377", url: "https://bugzilla.suse.com/1108377", }, { category: "self", summary: "SUSE Bug 1108498", url: "https://bugzilla.suse.com/1108498", }, { category: "self", summary: "SUSE Bug 1109158", url: "https://bugzilla.suse.com/1109158", }, { category: "self", summary: "SUSE Bug 1109333", url: "https://bugzilla.suse.com/1109333", }, { category: "self", summary: "SUSE Bug 1109772", url: "https://bugzilla.suse.com/1109772", }, { category: "self", summary: "SUSE Bug 1109784", url: "https://bugzilla.suse.com/1109784", }, { category: "self", summary: "SUSE Bug 1109806", url: "https://bugzilla.suse.com/1109806", }, { category: "self", summary: "SUSE Bug 1109818", url: "https://bugzilla.suse.com/1109818", }, { category: "self", summary: "SUSE Bug 1109907", url: "https://bugzilla.suse.com/1109907", }, { category: "self", summary: "SUSE Bug 1109919", url: "https://bugzilla.suse.com/1109919", }, { category: "self", summary: "SUSE Bug 1109923", url: "https://bugzilla.suse.com/1109923", }, { category: "self", summary: "SUSE Bug 1110006", url: "https://bugzilla.suse.com/1110006", }, { category: "self", summary: "SUSE Bug 1110363", url: "https://bugzilla.suse.com/1110363", }, { category: "self", summary: "SUSE Bug 1110468", url: "https://bugzilla.suse.com/1110468", }, { category: "self", summary: "SUSE Bug 1110600", url: "https://bugzilla.suse.com/1110600", }, { category: "self", summary: "SUSE Bug 1110601", url: "https://bugzilla.suse.com/1110601", }, { category: "self", summary: "SUSE Bug 1110602", url: "https://bugzilla.suse.com/1110602", }, { category: "self", summary: "SUSE Bug 1110603", url: "https://bugzilla.suse.com/1110603", }, { category: "self", summary: "SUSE Bug 1110604", url: "https://bugzilla.suse.com/1110604", }, { category: "self", summary: "SUSE Bug 1110605", url: "https://bugzilla.suse.com/1110605", }, { category: "self", summary: "SUSE Bug 1110606", url: "https://bugzilla.suse.com/1110606", }, { category: "self", summary: "SUSE Bug 1110611", url: "https://bugzilla.suse.com/1110611", }, { category: "self", summary: "SUSE Bug 1110612", url: "https://bugzilla.suse.com/1110612", }, { category: "self", summary: "SUSE Bug 1110613", url: "https://bugzilla.suse.com/1110613", }, { category: "self", summary: "SUSE Bug 1110614", url: "https://bugzilla.suse.com/1110614", }, { category: "self", summary: "SUSE Bug 1110615", url: "https://bugzilla.suse.com/1110615", }, { category: "self", summary: "SUSE Bug 1110616", url: "https://bugzilla.suse.com/1110616", }, { category: "self", summary: "SUSE Bug 1110618", url: "https://bugzilla.suse.com/1110618", }, { category: "self", summary: "SUSE Bug 1110619", url: "https://bugzilla.suse.com/1110619", }, { category: "self", summary: "SUSE Bug 1111363", url: "https://bugzilla.suse.com/1111363", }, { category: "self", summary: "SUSE Bug 1111516", url: "https://bugzilla.suse.com/1111516", }, { category: "self", summary: "SUSE Bug 1111870", url: "https://bugzilla.suse.com/1111870", }, { category: "self", summary: "SUSE Bug 1112007", url: "https://bugzilla.suse.com/1112007", }, { category: "self", summary: "SUSE Bug 1112262", url: "https://bugzilla.suse.com/1112262", }, { category: "self", summary: "SUSE Bug 1112263", url: "https://bugzilla.suse.com/1112263", }, { category: "self", summary: "SUSE Bug 1112894", url: "https://bugzilla.suse.com/1112894", }, { category: "self", summary: "SUSE Bug 1112902", url: "https://bugzilla.suse.com/1112902", }, { category: "self", summary: "SUSE Bug 1112903", url: "https://bugzilla.suse.com/1112903", }, { category: "self", summary: "SUSE Bug 1112905", url: "https://bugzilla.suse.com/1112905", }, { category: "self", summary: "SUSE Bug 1113667", url: "https://bugzilla.suse.com/1113667", }, { category: "self", summary: "SUSE Bug 1113751", url: "https://bugzilla.suse.com/1113751", }, { category: "self", summary: "SUSE Bug 1113769", url: "https://bugzilla.suse.com/1113769", }, { category: "self", summary: "SUSE Bug 1114178", url: "https://bugzilla.suse.com/1114178", }, { category: "self", summary: "SUSE Bug 1114229", url: "https://bugzilla.suse.com/1114229", }, { category: "self", summary: "SUSE Bug 1114648", url: "https://bugzilla.suse.com/1114648", }, { category: "self", summary: "SUSE Bug 981083", url: "https://bugzilla.suse.com/981083", }, { category: "self", summary: "SUSE Bug 997172", url: "https://bugzilla.suse.com/997172", }, { category: "self", summary: "SUSE CVE CVE-2018-14633 page", url: "https://www.suse.com/security/cve/CVE-2018-14633/", }, { category: "self", summary: "SUSE CVE CVE-2018-18281 page", url: "https://www.suse.com/security/cve/CVE-2018-18281/", }, { category: "self", summary: "SUSE CVE CVE-2018-18386 page", url: "https://www.suse.com/security/cve/CVE-2018-18386/", }, { category: "self", summary: "SUSE CVE CVE-2018-18690 page", url: "https://www.suse.com/security/cve/CVE-2018-18690/", }, { category: "self", summary: "SUSE CVE CVE-2018-18710 page", url: "https://www.suse.com/security/cve/CVE-2018-18710/", }, { category: "self", summary: "SUSE CVE CVE-2018-9516 page", url: "https://www.suse.com/security/cve/CVE-2018-9516/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2018-11-09T16:00:42Z", generator: { date: "2018-11-09T16:00:42Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:3689-1", initial_release_date: "2018-11-09T16:00:42Z", revision_history: [ { date: "2018-11-09T16:00:42Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-obs-build-4.4.162-94.69.2.aarch64", product: { name: "kernel-obs-build-4.4.162-94.69.2.aarch64", product_id: "kernel-obs-build-4.4.162-94.69.2.aarch64", }, }, { category: "product_version", name: "kernel-default-4.4.162-94.69.2.aarch64", product: { name: "kernel-default-4.4.162-94.69.2.aarch64", product_id: "kernel-default-4.4.162-94.69.2.aarch64", }, }, { category: "product_version", name: "kernel-default-base-4.4.162-94.69.2.aarch64", product: { name: "kernel-default-base-4.4.162-94.69.2.aarch64", product_id: "kernel-default-base-4.4.162-94.69.2.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-4.4.162-94.69.2.aarch64", product: { name: "kernel-default-devel-4.4.162-94.69.2.aarch64", product_id: "kernel-default-devel-4.4.162-94.69.2.aarch64", }, }, { category: "product_version", name: "kernel-syms-4.4.162-94.69.2.aarch64", product: { name: "kernel-syms-4.4.162-94.69.2.aarch64", product_id: "kernel-syms-4.4.162-94.69.2.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-4.4.162-94.69.2.noarch", product: { name: "kernel-devel-4.4.162-94.69.2.noarch", product_id: "kernel-devel-4.4.162-94.69.2.noarch", }, }, { category: "product_version", name: "kernel-macros-4.4.162-94.69.2.noarch", product: { name: "kernel-macros-4.4.162-94.69.2.noarch", product_id: "kernel-macros-4.4.162-94.69.2.noarch", }, }, { category: "product_version", name: "kernel-source-4.4.162-94.69.2.noarch", product: { name: "kernel-source-4.4.162-94.69.2.noarch", product_id: "kernel-source-4.4.162-94.69.2.noarch", }, }, { category: "product_version", name: "kernel-docs-4.4.162-94.69.2.noarch", product: { name: "kernel-docs-4.4.162-94.69.2.noarch", product_id: "kernel-docs-4.4.162-94.69.2.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.4.162-94.69.2.ppc64le", product: { name: "cluster-md-kmp-default-4.4.162-94.69.2.ppc64le", product_id: "cluster-md-kmp-default-4.4.162-94.69.2.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-4.4.162-94.69.2.ppc64le", product: { name: "dlm-kmp-default-4.4.162-94.69.2.ppc64le", product_id: "dlm-kmp-default-4.4.162-94.69.2.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-4.4.162-94.69.2.ppc64le", product: { name: "gfs2-kmp-default-4.4.162-94.69.2.ppc64le", product_id: "gfs2-kmp-default-4.4.162-94.69.2.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.4.162-94.69.2.ppc64le", product: { name: "ocfs2-kmp-default-4.4.162-94.69.2.ppc64le", product_id: "ocfs2-kmp-default-4.4.162-94.69.2.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-4.4.162-94.69.2.ppc64le", product: { name: "kernel-obs-build-4.4.162-94.69.2.ppc64le", product_id: "kernel-obs-build-4.4.162-94.69.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-4.4.162-94.69.2.ppc64le", product: { name: "kernel-default-4.4.162-94.69.2.ppc64le", product_id: "kernel-default-4.4.162-94.69.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-4.4.162-94.69.2.ppc64le", product: { name: "kernel-default-base-4.4.162-94.69.2.ppc64le", product_id: "kernel-default-base-4.4.162-94.69.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-4.4.162-94.69.2.ppc64le", product: { name: "kernel-default-devel-4.4.162-94.69.2.ppc64le", product_id: "kernel-default-devel-4.4.162-94.69.2.ppc64le", }, }, { category: "product_version", name: "kernel-syms-4.4.162-94.69.2.ppc64le", product: { name: "kernel-syms-4.4.162-94.69.2.ppc64le", product_id: "kernel-syms-4.4.162-94.69.2.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.4.162-94.69.2.s390x", product: { name: "cluster-md-kmp-default-4.4.162-94.69.2.s390x", product_id: "cluster-md-kmp-default-4.4.162-94.69.2.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-4.4.162-94.69.2.s390x", product: { name: "dlm-kmp-default-4.4.162-94.69.2.s390x", product_id: "dlm-kmp-default-4.4.162-94.69.2.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-4.4.162-94.69.2.s390x", product: { name: "gfs2-kmp-default-4.4.162-94.69.2.s390x", product_id: "gfs2-kmp-default-4.4.162-94.69.2.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.4.162-94.69.2.s390x", product: { name: "ocfs2-kmp-default-4.4.162-94.69.2.s390x", product_id: "ocfs2-kmp-default-4.4.162-94.69.2.s390x", }, }, { category: "product_version", name: "kernel-obs-build-4.4.162-94.69.2.s390x", product: { name: "kernel-obs-build-4.4.162-94.69.2.s390x", product_id: "kernel-obs-build-4.4.162-94.69.2.s390x", }, }, { category: "product_version", name: "kernel-default-4.4.162-94.69.2.s390x", product: { name: "kernel-default-4.4.162-94.69.2.s390x", product_id: "kernel-default-4.4.162-94.69.2.s390x", }, }, { category: "product_version", name: "kernel-default-base-4.4.162-94.69.2.s390x", product: { name: "kernel-default-base-4.4.162-94.69.2.s390x", product_id: "kernel-default-base-4.4.162-94.69.2.s390x", }, }, { category: "product_version", name: "kernel-default-devel-4.4.162-94.69.2.s390x", product: { name: "kernel-default-devel-4.4.162-94.69.2.s390x", product_id: "kernel-default-devel-4.4.162-94.69.2.s390x", }, }, { category: "product_version", name: "kernel-default-man-4.4.162-94.69.2.s390x", product: { name: "kernel-default-man-4.4.162-94.69.2.s390x", product_id: "kernel-default-man-4.4.162-94.69.2.s390x", }, }, { category: "product_version", name: "kernel-syms-4.4.162-94.69.2.s390x", product: { name: "kernel-syms-4.4.162-94.69.2.s390x", product_id: "kernel-syms-4.4.162-94.69.2.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "kernel-default-4.4.162-94.69.2.x86_64", product: { name: "kernel-default-4.4.162-94.69.2.x86_64", product_id: "kernel-default-4.4.162-94.69.2.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-4.4.162-94.69.2.x86_64", product: { name: "kernel-default-devel-4.4.162-94.69.2.x86_64", product_id: "kernel-default-devel-4.4.162-94.69.2.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-4.4.162-94.69.2.x86_64", product: { name: "kernel-default-extra-4.4.162-94.69.2.x86_64", product_id: "kernel-default-extra-4.4.162-94.69.2.x86_64", }, }, { category: "product_version", name: "kernel-syms-4.4.162-94.69.2.x86_64", product: { name: "kernel-syms-4.4.162-94.69.2.x86_64", product_id: "kernel-syms-4.4.162-94.69.2.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-default-4.4.162-94.69.2.x86_64", product: { name: "cluster-md-kmp-default-4.4.162-94.69.2.x86_64", product_id: "cluster-md-kmp-default-4.4.162-94.69.2.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-4.4.162-94.69.2.x86_64", product: { name: "dlm-kmp-default-4.4.162-94.69.2.x86_64", product_id: "dlm-kmp-default-4.4.162-94.69.2.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.4.162-94.69.2.x86_64", product: { name: "gfs2-kmp-default-4.4.162-94.69.2.x86_64", product_id: "gfs2-kmp-default-4.4.162-94.69.2.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.4.162-94.69.2.x86_64", product: { name: "ocfs2-kmp-default-4.4.162-94.69.2.x86_64", product_id: "ocfs2-kmp-default-4.4.162-94.69.2.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-4.4.162-94.69.2.x86_64", product: { name: "kernel-obs-build-4.4.162-94.69.2.x86_64", product_id: "kernel-obs-build-4.4.162-94.69.2.x86_64", }, }, { category: "product_version", name: "kernel-default-base-4.4.162-94.69.2.x86_64", product: { name: "kernel-default-base-4.4.162-94.69.2.x86_64", product_id: "kernel-default-base-4.4.162-94.69.2.x86_64", }, }, { category: "product_version", name: "lttng-modules-2.7.1-8.6.1.x86_64", product: { name: "lttng-modules-2.7.1-8.6.1.x86_64", product_id: "lttng-modules-2.7.1-8.6.1.x86_64", }, }, { category: "product_version", name: "lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", product: { name: "lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", product_id: "lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Desktop 12 SP3", product: { name: "SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sled:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 12 SP3", product: { name: "SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP3", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3", product: { name: "SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 12 SP3", product: { name: "SUSE Linux Enterprise Workstation Extension 12 SP3", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:12:sp3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.162-94.69.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", }, product_reference: "kernel-default-4.4.162-94.69.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.162-94.69.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", }, product_reference: "kernel-default-devel-4.4.162-94.69.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-4.4.162-94.69.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", }, product_reference: "kernel-default-extra-4.4.162-94.69.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.162-94.69.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", }, product_reference: "kernel-devel-4.4.162-94.69.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.162-94.69.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", }, product_reference: "kernel-macros-4.4.162-94.69.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.162-94.69.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.162-94.69.2.noarch", }, product_reference: "kernel-source-4.4.162-94.69.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.162-94.69.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", }, product_reference: "kernel-syms-4.4.162-94.69.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.4.162-94.69.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.ppc64le", }, product_reference: "cluster-md-kmp-default-4.4.162-94.69.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.4.162-94.69.2.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.s390x", }, product_reference: "cluster-md-kmp-default-4.4.162-94.69.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.4.162-94.69.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.x86_64", }, product_reference: "cluster-md-kmp-default-4.4.162-94.69.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.4.162-94.69.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.ppc64le", }, product_reference: "dlm-kmp-default-4.4.162-94.69.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.4.162-94.69.2.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.s390x", }, product_reference: "dlm-kmp-default-4.4.162-94.69.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.4.162-94.69.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.x86_64", }, product_reference: "dlm-kmp-default-4.4.162-94.69.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.4.162-94.69.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.ppc64le", }, product_reference: "gfs2-kmp-default-4.4.162-94.69.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.4.162-94.69.2.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.s390x", }, product_reference: "gfs2-kmp-default-4.4.162-94.69.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.4.162-94.69.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.x86_64", }, product_reference: "gfs2-kmp-default-4.4.162-94.69.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.4.162-94.69.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.ppc64le", }, product_reference: "ocfs2-kmp-default-4.4.162-94.69.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.4.162-94.69.2.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.s390x", }, product_reference: "ocfs2-kmp-default-4.4.162-94.69.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.4.162-94.69.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.x86_64", }, product_reference: "ocfs2-kmp-default-4.4.162-94.69.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.4.162-94.69.2.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.162-94.69.2.noarch", }, product_reference: "kernel-docs-4.4.162-94.69.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.4.162-94.69.2.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.aarch64", }, product_reference: "kernel-obs-build-4.4.162-94.69.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.4.162-94.69.2.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.ppc64le", }, product_reference: "kernel-obs-build-4.4.162-94.69.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.4.162-94.69.2.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.s390x", }, product_reference: "kernel-obs-build-4.4.162-94.69.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.4.162-94.69.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.x86_64", }, product_reference: "kernel-obs-build-4.4.162-94.69.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.162-94.69.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", }, product_reference: "kernel-default-4.4.162-94.69.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.162-94.69.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", }, product_reference: "kernel-default-4.4.162-94.69.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.162-94.69.2.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.s390x", }, product_reference: "kernel-default-4.4.162-94.69.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.162-94.69.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", }, product_reference: "kernel-default-4.4.162-94.69.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.162-94.69.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", }, product_reference: "kernel-default-base-4.4.162-94.69.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.162-94.69.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", }, product_reference: "kernel-default-base-4.4.162-94.69.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.162-94.69.2.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", }, product_reference: "kernel-default-base-4.4.162-94.69.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.162-94.69.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", }, product_reference: "kernel-default-base-4.4.162-94.69.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.162-94.69.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", }, product_reference: "kernel-default-devel-4.4.162-94.69.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.162-94.69.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", }, product_reference: "kernel-default-devel-4.4.162-94.69.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.162-94.69.2.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", }, product_reference: "kernel-default-devel-4.4.162-94.69.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.162-94.69.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", }, product_reference: "kernel-default-devel-4.4.162-94.69.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.4.162-94.69.2.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", }, product_reference: "kernel-default-man-4.4.162-94.69.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.162-94.69.2.noarch as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", }, product_reference: "kernel-devel-4.4.162-94.69.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.162-94.69.2.noarch as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", }, product_reference: "kernel-macros-4.4.162-94.69.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.162-94.69.2.noarch as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.162-94.69.2.noarch", }, product_reference: "kernel-source-4.4.162-94.69.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.162-94.69.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", }, product_reference: "kernel-syms-4.4.162-94.69.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.162-94.69.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", }, product_reference: "kernel-syms-4.4.162-94.69.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.162-94.69.2.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", }, product_reference: "kernel-syms-4.4.162-94.69.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.162-94.69.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", }, product_reference: "kernel-syms-4.4.162-94.69.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "lttng-modules-2.7.1-8.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", }, product_reference: "lttng-modules-2.7.1-8.6.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", }, product_reference: "lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.162-94.69.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", }, product_reference: "kernel-default-4.4.162-94.69.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.162-94.69.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", }, product_reference: "kernel-default-4.4.162-94.69.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.162-94.69.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.s390x", }, product_reference: "kernel-default-4.4.162-94.69.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.162-94.69.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", }, product_reference: "kernel-default-4.4.162-94.69.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.162-94.69.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", }, product_reference: "kernel-default-base-4.4.162-94.69.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.162-94.69.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", }, product_reference: "kernel-default-base-4.4.162-94.69.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.162-94.69.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", }, product_reference: "kernel-default-base-4.4.162-94.69.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.162-94.69.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", }, product_reference: "kernel-default-base-4.4.162-94.69.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.162-94.69.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", }, product_reference: "kernel-default-devel-4.4.162-94.69.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.162-94.69.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", }, product_reference: "kernel-default-devel-4.4.162-94.69.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.162-94.69.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", }, product_reference: "kernel-default-devel-4.4.162-94.69.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.162-94.69.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", }, product_reference: "kernel-default-devel-4.4.162-94.69.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.4.162-94.69.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", }, product_reference: "kernel-default-man-4.4.162-94.69.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.162-94.69.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", }, product_reference: "kernel-devel-4.4.162-94.69.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.162-94.69.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", }, product_reference: "kernel-macros-4.4.162-94.69.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.162-94.69.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.162-94.69.2.noarch", }, product_reference: "kernel-source-4.4.162-94.69.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.162-94.69.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", }, product_reference: "kernel-syms-4.4.162-94.69.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.162-94.69.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", }, product_reference: "kernel-syms-4.4.162-94.69.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.162-94.69.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", }, product_reference: "kernel-syms-4.4.162-94.69.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.162-94.69.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", }, product_reference: "kernel-syms-4.4.162-94.69.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "lttng-modules-2.7.1-8.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", }, product_reference: "lttng-modules-2.7.1-8.6.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", }, product_reference: "lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-4.4.162-94.69.2.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP3", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", }, product_reference: "kernel-default-extra-4.4.162-94.69.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 12 SP3", }, ], }, vulnerabilities: [ { cve: "CVE-2018-14633", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14633", }, ], notes: [ { category: "general", text: "A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14633", url: "https://www.suse.com/security/cve/CVE-2018-14633", }, { category: "external", summary: "SUSE Bug 1107829 for CVE-2018-14633", url: "https://bugzilla.suse.com/1107829", }, { category: "external", summary: "SUSE Bug 1107832 for CVE-2018-14633", url: "https://bugzilla.suse.com/1107832", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-09T16:00:42Z", details: "important", }, ], title: "CVE-2018-14633", }, { cve: "CVE-2018-18281", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18281", }, ], notes: [ { category: "general", text: "Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. This is fixed in the following kernel versions: 4.9.135, 4.14.78, 4.18.16, 4.19.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18281", url: "https://www.suse.com/security/cve/CVE-2018-18281", }, { category: "external", summary: "SUSE Bug 1113769 for CVE-2018-18281", url: "https://bugzilla.suse.com/1113769", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-09T16:00:42Z", details: "moderate", }, ], title: "CVE-2018-18281", }, { cve: "CVE-2018-18386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18386", }, ], notes: [ { category: "general", text: "drivers/tty/n_tty.c in the Linux kernel before 4.14.11 allows local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18386", url: "https://www.suse.com/security/cve/CVE-2018-18386", }, { category: "external", summary: "SUSE Bug 1094825 for CVE-2018-18386", url: "https://bugzilla.suse.com/1094825", }, { category: "external", summary: "SUSE Bug 1112039 for CVE-2018-18386", url: "https://bugzilla.suse.com/1112039", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-09T16:00:42Z", details: "moderate", }, ], title: "CVE-2018-18386", }, { cve: "CVE-2018-18690", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18690", }, ], notes: [ { category: "general", text: "In the Linux kernel before 4.17, a local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandles ATTR_REPLACE operations with conversion of an attr from short to long form.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18690", url: "https://www.suse.com/security/cve/CVE-2018-18690", }, { category: "external", summary: "SUSE Bug 1105025 for CVE-2018-18690", url: "https://bugzilla.suse.com/1105025", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-09T16:00:42Z", details: "moderate", }, ], title: "CVE-2018-18690", }, { cve: "CVE-2018-18710", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18710", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18710", url: "https://www.suse.com/security/cve/CVE-2018-18710", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-18710", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-09T16:00:42Z", details: "moderate", }, ], title: "CVE-2018-18710", }, { cve: "CVE-2018-9516", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-9516", }, ], notes: [ { category: "general", text: "In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-71361580.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-9516", url: "https://www.suse.com/security/cve/CVE-2018-9516", }, { category: "external", summary: "SUSE Bug 1108498 for CVE-2018-9516", url: "https://bugzilla.suse.com/1108498", }, { category: "external", summary: "SUSE Bug 1123161 for CVE-2018-9516", url: "https://bugzilla.suse.com/1123161", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.162-94.69.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.162-94.69.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.162-94.69.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-09T16:00:42Z", details: "moderate", }, ], title: "CVE-2018-9516", }, ], }
suse-su-2019:0224-1
Vulnerability from csaf_suse
Published
2019-02-01 18:55
Modified
2019-02-01 18:55
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.
This update brings following features:
- Support for Enhanced-IBRS on new Intel CPUs (fate#326564)
The following security bugs were fixed:
- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bnc#1118319).
- CVE-2018-12232: In net/socket.c there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat did not increment the file descriptor reference count, which allowed close to set the socket to NULL during fchownat's execution, leading to a NULL pointer dereference and system crash (bnc#1097593).
- CVE-2018-14625: A flaw was found where an attacker may be able to have an uncontrolled read to kernel-memory from within a vm guest. A race condition between connect() and close() function may allow an attacker using the AF_VSOCK protocol to gather a 4 byte information leak or possibly intercept or corrupt AF_VSOCK messages destined to other clients (bnc#1106615).
- CVE-2018-16862: A security flaw was found in the way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one (bnc#1117186).
- CVE-2018-16884: NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bnc#1119946).
- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).
- CVE-2018-18397: The userfaultfd implementation mishandled access control for certain UFFDIO_ ioctl calls, as demonstrated by allowing local users to write data into holes in a tmpfs file (if the user has read-only access to that file, and that file contains holes), related to fs/userfaultfd.c and mm/userfaultfd.c (bnc#1117656).
- CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).
- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized (bnc#1116841).
- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).
- CVE-2018-19854: An issue was discovered in the crypto_report_one() and related functions in crypto/crypto_user.c (the crypto user configuration API) do not fully initialize structures that are copied to userspace, potentially leaking sensitive memory to user programs. NOTE: this is a CVE-2013-2547 regression but with easier exploitability because the attacker did not need a capability (however, the system must have the CONFIG_CRYPTO_USER kconfig option) (bnc#1118428).
- CVE-2018-19985: The function hso_probe read if_num from the USB device (as an u8) and used it without a length check to index an array, resulting in an OOB memory read in hso_probe or hso_get_config_data that could be used by local attackers (bnc#1120743).
- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).
The following non-security bugs were fixed:
- acpi/apei: Handle GSIV and GPIO notification types (bsc#1115567).
- acpica: Tables: Add WSMT support (bsc#1089350).
- acpi/cpcc: Check for valid PCC subspace only if PCC is used (bsc#1117115).
- acpi/cpcc: Update all pr_(debug/err) messages to log the susbspace id (bsc#1117115).
- acpi/iort: Fix iort_get_platform_device_domain() uninitialized pointer value (bsc#1051510).
- acpi/LPSS: Add alternative ACPI HIDs for Cherry Trail DMA controllers (bsc#1051510).
- acpi/nfit: Fix ARS overflow continuation (bsc#1116895).
- acpi/nfit, x86/mce: Handle only uncorrectable machine checks (bsc#1114279).
- acpi/nfit, x86/mce: Validate a MCE's address before using it (bsc#1114279).
- acpi/platform: Add SMB0001 HID to forbidden_id_list (bsc#1051510).
- acpi/watchdog: Prefer iTCO_wdt always when WDAT table uses RTC SRAM (bsc#1051510).
- act_ife: fix a potential use-after-free (networking-stable-18_09_11).
- aio: fix spectre gadget in lookup_ioctx (bsc#1120594).
- alsa: ac97: Fix incorrect bit shift at AC97-SPSA control write (bsc#1051510).
- alsa: ca0106: Disable IZD on SB0570 DAC to fix audio pops (bsc#1051510).
- alsa: control: Fix race between adding and removing a user element (bsc#1051510).
- alsa: cs46xx: Potential NULL dereference in probe (bsc#1051510).
- alsa: emu10k1: Fix potential Spectre v1 vulnerabilities (bsc#1051510).
- alsa: emux: Fix potential Spectre v1 vulnerabilities (bsc#1051510).
- alsa: fireface: fix for state to fetch PCM frames (bsc#1051510).
- alsa: fireface: fix reference to wrong register for clock configuration (bsc#1051510).
- alsa: firewire-lib: fix wrong assignment for 'out_packet_without_header' tracepoint (bsc#1051510).
- alsa: firewire-lib: fix wrong handling payload_length as payload_quadlet (bsc#1051510).
- alsa: firewire-lib: use the same print format for 'without_header' tracepoints (bsc#1051510).
- alsa: hda: Add 2 more models to the power_save blacklist (bsc#1051510).
- alsa: hda: Add ASRock N68C-S UCC the power_save blacklist (bsc#1051510).
- alsa: hda - Add mic quirk for the Lenovo G50-30 (17aa:3905) (bsc#1051510).
- alsa: hda: add mute LED support for HP EliteBook 840 G4 (bsc#1051510).
- alsa: hda - Add quirk for ASUS G751 laptop (bsc#1051510).
- alsa: hda: Add support for AMD Stoney Ridge (bsc#1051510).
- alsa: hda/ca0132 - Call pci_iounmap() instead of iounmap() (bsc#1051510).
- alsa: hda/ca0132 - make pci_iounmap() call conditional (bsc#1051510).
- alsa: hda: fix front speakers on Huawei MBXP (bsc#1051510).
- alsa: hda - Fix headphone pin config for ASUS G751 (bsc#1051510).
- alsa: hda: fix unused variable warning (bsc#1051510).
- alsa: hda/realtek - Add auto-mute quirk for HP Spectre x360 laptop (bsc#1051510).
- alsa: hda/realtek - Add GPIO data update helper (bsc#1051510).
- alsa: hda/realtek - Add support for Acer Aspire C24-860 headset mic (bsc#1051510).
- alsa: hda/realtek - Add unplug function into unplug state of Headset Mode for ALC225 (bsc#1051510).
- alsa: hda/realtek: ALC286 mic and headset-mode fixups for Acer Aspire U27-880 (bsc#1051510).
- alsa: hda/realtek: ALC294 mic and headset-mode fixups for ASUS X542UN (bsc#1051510).
- alsa: hda/realtek - Allow skipping spec->init_amp detection (bsc#1051510).
- alsa: hda/realtek - Disable headset Mic VREF for headset mode of ALC225 (bsc#1051510).
- alsa: hda/realtek: Enable audio jacks of ASUS UX391UA with ALC294 (bsc#1051510).
- alsa: hda/realtek: Enable audio jacks of ASUS UX433FN/UX333FA with ALC294 (bsc#1051510).
- alsa: hda/realtek: Enable audio jacks of ASUS UX533FD with ALC294 (bsc#1051510).
- alsa: hda/realtek: Enable the headset mic auto detection for ASUS laptops (bsc#1051510).
- alsa: hda/realtek - Fixed headphone issue for ALC700 (bsc#1051510).
- alsa: hda/realtek - fix headset mic detection for MSI MS-B171 (bsc#1051510).
- alsa: hda/realtek - Fix HP Headset Mic can't record (bsc#1051510).
- alsa: hda/realtek: Fix mic issue on Acer AIO Veriton Z4660G (bsc#1051510).
- alsa: hda/realtek: Fix mic issue on Acer AIO Veriton Z4860G/Z6860G (bsc#1051510).
- alsa: hda/realtek - Fix speaker output regression on Thinkpad T570 (bsc#1051510).
- alsa: hda/realtek - Fix the mute LED regresion on Lenovo X1 Carbon (bsc#1051510).
- alsa: hda/realtek - fix the pop noise on headphone for lenovo laptops (bsc#1051510).
- alsa: hda/realtek - Fix the problem of the front MIC on the Lenovo M715 (bsc#1051510).
- alsa: hda/realtek - Manage GPIO bits commonly (bsc#1051510).
- alsa: hda/realtek - Simplify Dell XPS13 GPIO handling (bsc#1051510).
- alsa: hda/realtek - Support ALC300 (bsc#1051510).
- alsa: hda/realtek - Support Dell headset mode for New AIO platform (bsc#1051510).
- alsa: hda/tegra: clear pending irq handlers (bsc#1051510).
- alsa: oss: Use kvzalloc() for local buffer allocations (bsc#1051510).
- alsa: pcm: Call snd_pcm_unlink() conditionally at closing (bsc#1051510).
- alsa: pcm: Fix interval evaluation with openmin/max (bsc#1051510).
- alsa: pcm: Fix potential Spectre v1 vulnerability (bsc#1051510).
- alsa: pcm: Fix starvation on down_write_nonblock() (bsc#1051510).
- alsa: rme9652: Fix potential Spectre v1 vulnerability (bsc#1051510).
- alsa: sparc: Fix invalid snd_free_pages() at error path (bsc#1051510).
- alsa: trident: Suppress gcc string warning (bsc#1051510).
- alsa: usb-audio: Add SMSL D1 to quirks for native DSD support (bsc#1051510).
- alsa: usb-audio: Add support for Encore mDSD USB DAC (bsc#1051510).
- alsa: usb-audio: Add vendor and product name for Dell WD19 Dock (bsc#1051510).
- alsa: usb-audio: Avoid access before bLength check in build_audio_procunit() (bsc#1051510).
- alsa: usb-audio: Fix an out-of-bound read in create_composite_quirks (bsc#1051510).
- alsa: usb-audio: update quirk for B&W PX to remove microphone (bsc#1051510).
- alsa: wss: Fix invalid snd_free_pages() at error path (bsc#1051510).
- alsa: x86: Fix runtime PM for hdmi-lpe-audio (bsc#1051510).
- amd/iommu: Fix Guest Virtual APIC Log Tail Address Register (bsc#1106105).
- apparmor: do not try to replace stale label in ptrace access check (git-fixes).
- apparmor: do not try to replace stale label in ptraceme check (git-fixes).
- apparmor: Fix uninitialized value in aa_split_fqname (git-fixes).
- arm64: Add work around for Arm Cortex-A55 Erratum 1024718 (bsc#1120612).
- arm64: atomics: Remove '&' from '+&' asm constraint in lse atomics (bsc#1120613).
- arm64: cpu_errata: include required headers (bsc#1120615).
- arm64: dma-mapping: Fix FORCE_CONTIGUOUS buffer clearing (bsc#1120633).
- arm64: Enabled ENA (Amazon network driver) for arm64.
- arm64: Fix /proc/iomem for reserved but not memory regions (bsc#1120632).
- arm64: kvm: Move CPU ID reg trap setup off the world switch path (bsc#1110998).
- arm64: kvm: Sanitize PSTATE.M when being set from userspace (bsc#1110998).
- arm64: kvm: Tighten guest core register access from userspace (bsc#1110998).
- arm64: lse: Add early clobbers to some input/output asm operands (bsc#1120614).
- arm64: lse: remove -fcall-used-x0 flag (bsc#1120618).
- arm64: mm: always enable CONFIG_HOLES_IN_ZONE (bsc#1120617).
- arm64/numa: Report correct memblock range for the dummy node (bsc#1120620).
- arm64/numa: Unify common error path in numa_init() (bsc#1120621).
- arm64: remove no-op -p linker flag (bsc#1120616).
- arm: dts: at91: add new compatibility string for macb on sama5d3 (bsc#1051510).
- ASoC: dapm: Recalculate audio map forcely when card instantiated (bsc#1051510).
- ASoC: dwc: Added a quirk DW_I2S_QUIRK_16BIT_IDX_OVERRIDE to dwc (bsc#1085535)
- ASoC: Intel: cht_bsw_max98090: add support for Baytrail (bsc#1051510).
- ASoC: intel: cht_bsw_max98090_ti: Add pmc_plt_clk_0 quirk for Chromebook Clapper (bsc#1051510).
- ASoC: intel: cht_bsw_max98090_ti: Add pmc_plt_clk_0 quirk for Chromebook Gnawty (bsc#1051510).
- ASoC: intel: cht_bsw_max98090_ti: Add quirk for boards using pmc_plt_clk_0 (bsc#1051510).
- ASoC: Intel: mrfld: fix uninitialized variable access (bsc#1051510).
- ASoC: intel: skylake: Add missing break in skl_tplg_get_token() (bsc#1051510).
- ASoC: omap-abe-twl6040: Fix missing audio card caused by deferred probing (bsc#1051510).
- ASoC: omap-dmic: Add pm_qos handling to avoid overruns with CPU_IDLE (bsc#1051510).
- ASoC: omap-mcbsp: Fix latency value calculation for pm_qos (bsc#1051510).
- ASoC: omap-mcpdm: Add pm_qos handling to avoid under/overruns with CPU_IDLE (bsc#1051510).
- ASoC: rsnd: fixup clock start checker (bsc#1051510).
- ASoC: sun8i-codec: fix crash on module removal (bsc#1051510).
- ASoC: wm_adsp: Fix dma-unsafe read of scratch registers (bsc#1051510).
- ata: Fix racy link clearance (bsc#1107866).
- ataflop: fix error handling during setup (bsc#1051510).
- ath10k: do not assume this is a PCI dev in generic code (bsc#1051510).
- ath10k: schedule hardware restart if WMI command times out (bsc#1051510).
- ath6kl: Only use match sets when firmware supports it (bsc#1051510).
- autofs: fix autofs_sbi() does not check super block type (git-fixes).
- autofs: fix slab out of bounds read in getname_kernel() (git-fixes).
- autofs: mount point create should honour passed in mode (git-fixes).
- b43: Fix error in cordic routine (bsc#1051510).
- badblocks: fix wrong return value in badblocks_set if badblocks are disabled (git-fixes).
- batman-adv: Expand merged fragment buffer for full packet (bsc#1051510).
- batman-adv: Use explicit tvlv padding for ELP packets (bsc#1051510).
- bcache: fix miss key refill->end in writeback (Git-fixes).
- bcache: trace missed reading by cache_missed (Git-fixes).
- bitops: protect variables in bit_clear_unless() macro (bsc#1051510).
- bitops: protect variables in set_mask_bits() macro (bsc#1051510).
- blk-mq: remove synchronize_rcu() from blk_mq_del_queue_tag_set() (Git-fixes).
- block: allow max_discard_segments to be stacked (Git-fixes).
- block: blk_init_allocated_queue() set q->fq as NULL in the fail case (Git-fixes).
- block: copy ioprio in __bio_clone_fast() (bsc#1082653).
- block: really disable runtime-pm for blk-mq (Git-fixes).
- block: reset bi_iter.bi_done after splitting bio (Git-fixes).
- block: respect virtual boundary mask in bvecs (bsc#1113412).
- block/swim: Fix array bounds check (Git-fixes).
- bluetooth: btbcm: Add entry for BCM4335C0 UART bluetooth (bsc#1051510).
- bluetooth: SMP: fix crash in unpairing (bsc#1051510).
- bnxt_en: do not try to offload VLAN 'modify' action (bsc#1050242 ).
- bnxt_en: Fix enables field in HWRM_QUEUE_COS2BW_CFG request (bsc#1086282).
- bnxt_en: Fix TX timeout during netpoll (networking-stable-18_10_16).
- bnxt_en: Fix VNIC reservations on the PF (bsc#1086282 ).
- bnxt_en: free hwrm resources, if driver probe fails (networking-stable-18_10_16).
- bnxt_en: get the reduced max_irqs by the ones used by RDMA (bsc#1050242).
- bonding: avoid possible dead-lock (networking-stable-18_10_16).
- bonding: fix length of actor system (networking-stable-18_11_02).
- bonding: fix warning message (networking-stable-18_10_16).
- bonding: pass link-local packets to bonding master also (networking-stable-18_10_16).
- bpf: fix check of allowed specifiers in bpf_trace_printk (bsc#1083647).
- bpf: fix partial copy of map_ptr when dst is scalar (bsc#1083647).
- bpf, net: add skb_mac_header_len helper (networking-stable-18_09_24).
- bpf: use per htab salt for bucket hash (git-fixes).
- bpf: wait for running BPF programs when updating map-in-map (bsc#1083647).
- brcmfmac: fix for proper support of 160MHz bandwidth (bsc#1051510).
- brcmfmac: fix reporting support for 160 MHz channels (bsc#1051510).
- brcmutil: really fix decoding channel info for 160 MHz bandwidth (bsc#1051510).
- bridge: do not add port to router list when receives query with source 0.0.0.0 (networking-stable-18_11_02).
- btrfs: Always try all copies when reading extent buffers (git-fixes).
- btrfs: delete dead code in btrfs_orphan_add() (bsc#1111469).
- btrfs: delete dead code in btrfs_orphan_commit_root() (bsc#1111469).
- btrfs: do not BUG_ON() in btrfs_truncate_inode_items() (bsc#1111469).
- btrfs: do not check inode's runtime flags under root->orphan_lock (bsc#1111469).
- btrfs: do not return ino to ino cache if inode item removal fails (bsc#1111469).
- btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667).
- btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).
- btrfs: fix assertion failure during fsync in no-holes mode (bsc#1118136).
- btrfs: fix assertion on fsync of regular file when using no-holes feature (bsc#1118137).
- btrfs: fix cur_offset in the error case for nocow (bsc#1118140).
- btrfs: fix data corruption due to cloning of eof block (bsc#1116878).
- btrfs: fix deadlock on tree root leaf when finding free extent (bsc#1116876).
- btrfs: fix deadlock when writing out free space caches (bsc#1116700).
- btrfs: fix ENOSPC caused by orphan items reservations (bsc#1111469).
- btrfs: Fix error handling in btrfs_cleanup_ordered_extents (git-fixes).
- btrfs: fix error handling in btrfs_truncate() (bsc#1111469).
- btrfs: fix error handling in btrfs_truncate_inode_items() (bsc#1111469).
- btrfs: fix fsync of files with multiple hard links in new directories (1120173).
- btrfs: fix infinite loop on inode eviction after deduplication of eof block (bsc#1116877).
- btrfs: Fix memory barriers usage with device stats counters (git-fixes).
- btrfs: fix null pointer dereference on compressed write path error (bsc#1116698).
- btrfs: fix use-after-free during inode eviction (bsc#1116701).
- btrfs: fix use-after-free on root->orphan_block_rsv (bsc#1111469).
- btrfs: fix use-after-free when dumping free space (bsc#1116862).
- btrfs: fix warning when replaying log after fsync of a tmpfile (bsc#1116692).
- btrfs: fix wrong dentries after fsync of file that got its parent replaced (bsc#1116693).
- btrfs: get rid of BTRFS_INODE_HAS_ORPHAN_ITEM (bsc#1111469).
- btrfs: get rid of unused orphan infrastructure (bsc#1111469).
- btrfs: make sure we create all new block groups (bsc#1116699).
- btrfs: move btrfs_truncate_block out of trans handle (bsc#1111469).
- btrfs: protect space cache inode alloc with GFP_NOFS (bsc#1116863).
- btrfs: qgroup: Dirty all qgroups before rescan (bsc#1120036).
- btrfs: refactor btrfs_evict_inode() reserve refill dance (bsc#1111469).
- btrfs: renumber BTRFS_INODE_ runtime flags and switch to enums (bsc#1111469).
- btrfs: reserve space for O_TMPFILE orphan item deletion (bsc#1111469).
- btrfs: run delayed items before dropping the snapshot (bsc#1121263, bsc#1111188).
- btrfs: send, fix infinite loop due to directory rename dependencies (bsc#1118138).
- btrfs: stop creating orphan items for truncate (bsc#1111469).
- btrfs: tree-checker: Do not check max block group size as current max chunk size limit is unreliable (fixes for bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875).
- btrfs: update stale comments referencing vmtruncate() (bsc#1111469).
- cachefiles: fix the race between cachefiles_bury_object() and rmdir(2) (bsc#1051510).
- can: dev: __can_get_echo_skb(): Do not crash the kernel if can_priv::echo_skb is accessed out of bounds (bsc#1051510).
- can: dev: can_get_echo_skb(): factor out non sending code to __can_get_echo_skb() (bsc#1051510).
- can: dev: __can_get_echo_skb(): print error message, if trying to echo non existing skb (bsc#1051510).
- can: dev: __can_get_echo_skb(): replace struct can_frame by canfd_frame to access frame length (bsc#1051510).
- can: flexcan: flexcan_irq(): fix indention (bsc#1051510).
- can: hi311x: Use level-triggered interrupt (bsc#1051510).
- can: raw: check for CAN FD capable netdev in raw_sendmsg() (bsc#1051510).
- can: rcar_can: Fix erroneous registration (bsc#1051510).
- can: rx-offload: introduce can_rx_offload_get_echo_skb() and can_rx_offload_queue_sorted() functions (bsc#1051510).
- cdc-acm: correct counting of UART states in serial state notification (bsc#1051510).
- cdc-acm: do not reset notification buffer index upon urb unlinking (bsc#1051510).
- cdrom: do not attempt to fiddle with cdo->capability (bsc#1051510).
- ceph: do not update importing cap's mseq when handing cap export (bsc#1121273).
- ceph: fix dentry leak in ceph_readdir_prepopulate (bsc#1114839).
- ceph: quota: fix null pointer dereference in quota check (bsc#1114839).
- cfg80211: Address some corner cases in scan result channel updating (bsc#1051510).
- cfg80211: fix use-after-free in reg_process_hint() (bsc#1051510).
- char_dev: extend dynamic allocation of majors into a higher range (bsc#1121058).
- char_dev: Fix off-by-one bugs in find_dynamic_major() (bsc#1121058).
- clk: at91: Fix division by zero in PLL recalc_rate() (bsc#1051510).
- clk: fixed-factor: fix of_node_get-put imbalance (bsc#1051510).
- clk: fixed-rate: fix of_node_get-put imbalance (bsc#1051510).
- clk: mmp2: fix the clock id for sdh2_clk and sdh3_clk (bsc#1051510).
- clk: mmp: Off by one in mmp_clk_add() (bsc#1051510).
- clk: mvebu: Off by one bugs in cp110_of_clk_get() (bsc#1051510).
- clk: rockchip: Fix static checker warning in rockchip_ddrclk_get_parent call (bsc#1051510).
- clk: s2mps11: Add used attribute to s2mps11_dt_match (bsc#1051510).
- clk: s2mps11: Fix matching when built as module and DT node contains compatible (bsc#1051510).
- clk: samsung: exynos5420: Enable PERIS clocks for suspend (bsc#1051510).
- clockevents/drivers/i8253: Add support for PIT shutdown quirk (bsc#1051510).
- compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations (git-fixes).
- config: arm64: enable erratum 1024718
- configfs: replace strncpy with memcpy (bsc#1051510).
- cpufeature: avoid warning when compiling with clang (Git-fixes).
- cpufreq / CPPC: Add cpuinfo_cur_freq support for CPPC (bsc#1117115).
- cpufreq: CPPC: fix build in absence of v3 support (bsc#1117115).
- cpupower: remove stringop-truncation waring (git-fixes).
- crypto: bcm - fix normal/non key hash algorithm failure (bsc#1051510).
- crypto: caam - fix implicit casts in endianness helpers (bsc#1051510).
- crypto: ccp - Add DOWNLOAD_FIRMWARE SEV command ().
- crypto: ccp - Add GET_ID SEV command ().
- crypto: ccp - Add psp enabled message when initialization succeeds ().
- crypto: ccp - Add support for new CCP/PSP device ID ().
- crypto: ccp - Allow SEV firmware to be chosen based on Family and Model ().
- crypto: ccp - Fix static checker warning ().
- crypto: ccp - Remove unused #defines ().
- crypto: ccp - Support register differences between PSP devices ().
- crypto: lrw - Fix out-of bounds access on counter overflow (bsc#1051510).
- crypto: simd - correctly take reqsize of wrapped skcipher into account (bsc#1051510).
- crypto: tcrypt - fix ghash-generic speed test (bsc#1051510).
- dasd: fix deadlock in dasd_times_out (bsc#1121477, LTC#174111).
- dax: Check page->mapping isn't NULL (bsc#1120054).
- dax: Do not access a freed inode (bsc#1120055).
- device property: Define type of PROPERTY_ENRTY_*() macros (bsc#1051510).
- device property: fix fwnode_graph_get_next_endpoint() documentation (bsc#1051510).
- disable stringop truncation warnings for now (git-fixes).
- dm: allocate struct mapped_device with kvzalloc (Git-fixes).
- dm cache: destroy migration_cache if cache target registration failed (Git-fixes).
- dm cache: fix resize crash if user does not reload cache table (Git-fixes).
- dm cache metadata: ignore hints array being too small during resize (Git-fixes).
- dm cache metadata: save in-core policy_hint_size to on-disk superblock (Git-fixes).
- dm cache metadata: set dirty on all cache blocks after a crash (Git-fixes).
- dm cache: only allow a single io_mode cache feature to be requested (Git-fixes).
- dm crypt: do not decrease device limits (Git-fixes).
- dm: fix report zone remapping to account for partition offset (Git-fixes).
- dm integrity: change 'suspending' variable from bool to int (Git-fixes).
- dm ioctl: harden copy_params()'s copy_from_user() from malicious users (Git-fixes).
- dm linear: eliminate linear_end_io call if CONFIG_DM_ZONED disabled (Git-fixes).
- dm linear: fix linear_end_io conditional definition (Git-fixes).
- dm thin: handle running out of data space vs concurrent discard (Git-fixes).
- dm thin metadata: remove needless work from __commit_transaction (Git-fixes).
- dm thin: stop no_space_timeout worker when switching to write-mode (Git-fixes).
- dm writecache: fix a crash due to reading past end of dirty_bitmap (Git-fixes).
- dm writecache: report start_sector in status line (Git-fixes).
- dm zoned: fix metadata block ref counting (Git-fixes).
- dm zoned: fix various dmz_get_mblock() issues (Git-fixes).
- doc/README.SUSE: correct GIT url No more gitorious, github we use.
- Documentation/l1tf: Fix small spelling typo (bsc#1051510).
- Documentation/l1tf: Fix typos (bsc#1051510).
- Documentation/l1tf: Remove Yonah processors from not vulnerable list (bsc#1051510).
- do d_instantiate/unlock_new_inode combinations safely (git-fixes).
- driver/dma/ioat: Call del_timer_sync() without holding prep_lock (bsc#1051510).
- drivers/net/usb: add device id for TP-LINK UE300 USB 3.0 Ethernet (bsc#1119749).
- drivers/net/usb/r8152: remove the unneeded variable 'ret' in rtl8152_system_suspend (bsc#1119749).
- drivers/tty: add missing of_node_put() (bsc#1051510).
- drm/amdgpu: add missing CHIP_HAINAN in amdgpu_ucode_get_load_type (bsc#1051510).
- drm/amdgpu/gmc8: update MC firmware for polaris (bsc#1113722)
- drm/amdgpu/powerplay: fix missing break in switch statements (bsc#1113722)
- drm/amdgpu: update mc firmware image for polaris12 variants (bsc#1113722)
- drm/amdgpu: update SMC firmware image for polaris10 variants (bsc#1113722)
- drm/ast: change resolution may cause screen blurred (boo#1112963).
- drm/ast: fixed cursor may disappear sometimes (bsc#1051510).
- drm/ast: Fix incorrect free on ioregs (bsc#1051510).
- drm/ast: Remove existing framebuffers before loading driver (boo#1112963)
- drm/dp_mst: Check if primary mstb is null (bsc#1051510).
- drm/dp_mst: Skip validating ports during destruction, just ref (bsc#1051510).
- drm/edid: Add 6 bpc quirk for BOE panel (bsc#1051510).
- drm/edid: Add 6 bpc quirk for BOE panel in HP Pavilion 15-n233sl (bsc#1113722)
- drm/fb-helper: Ignore the value of fb_var_screeninfo.pixclock (bsc#1113722)
- drm: fb-helper: Reject all pixel format changing requests (bsc#1113722)
- drm/hisilicon: hibmc: Do not carry error code in HiBMC framebuffer (bsc#1113722)
- drm/hisilicon: hibmc: Do not overwrite fb helper surface depth (bsc#1113722)
- drm/i915/audio: Hook up component bindings even if displays are (bsc#1113722)
- drm/i915: Do not oops during modeset shutdown after lpe audio deinit (bsc#1051510).
- drm/i915: Do not unset intel_connector->mst_port (bsc#1051510).
- drm/i915/dp: Link train Fallback on eDP only if fallback link BW can fit panel's native mode (bsc#1051510).
- drm/i915/execlists: Apply a full mb before execution for Braswell (bsc#1113722)
- drm/i915/execlists: Force write serialisation into context image vs execution (bsc#1051510).
- drm/i915: Fix ilk+ watermarks when disabling pipes (bsc#1051510).
- drm/i915/gen9+: Fix initial readout for Y tiled framebuffers (bsc#1113722)
- drm/i915/glk: Remove 99% limitation (bsc#1051510).
- drm/i915/hdmi: Add HDMI 2.0 audio clock recovery N values (bsc#1051510).
- drm/i915: Large page offsets for pread/pwrite (bsc#1051510).
- drm/i915: Mark pin flags as u64 (bsc#1051510).
- drm/i915: Restore vblank interrupts earlier (bsc#1051510).
- drm/i915: Skip vcpi allocation for MSTB ports that are gone (bsc#1051510).
- drm/i915: Write GPU relocs harder with gen3 (bsc#1051510).
- drm/ioctl: Fix Spectre v1 vulnerabilities (bsc#1113722)
- drm/mediatek: fix OF sibling-node lookup (bsc#1106110)
- drm/meson: add support for 1080p25 mode (bsc#1051510).
- drm/meson: Enable fast_io in meson_dw_hdmi_regmap_config (bsc#1051510).
- drm/meson: Fix OOB memory accesses in meson_viu_set_osd_lut() (bsc#1051510).
- drm/msm: fix OF child-node lookup (bsc#1106110)
- drm/nouveau: Check backlight IDs are >= 0, not > 0 (bsc#1051510).
- drm/nouveau: Do not disable polling in fallback mode (bsc#1103356).
- drm/nouveau/kms: Fix memory leak in nv50_mstm_del() (bsc#1113722)
- drm/omap: fix memory barrier bug in DMM driver (bsc#1051510).
- drm: rcar-du: Fix external clock error checks (bsc#1113722)
- drm: rcar-du: Fix vblank initialization (bsc#1113722)
- drm/rockchip: Allow driver to be shutdown on reboot/kexec (bsc#1051510).
- drm/rockchip: psr: do not dereference encoder before it is null (bsc#1113722)
- drm: set is_master to 0 upon drm_new_set_master() failure (bsc#1113722)
- drm/sti: do not remove the drm_bridge that was never added (bsc#1100132)
- drm/vc4: Set ->is_yuv to false when num_planes == 1 (bsc#1113722)
- drm/vc4: ->x_scaling[1] should never be set to VC4_SCALING_NONE (bsc#1113722)
- drm/virtio: fix bounds check in virtio_gpu_cmd_get_capset() (bsc#1113722)
- dt-bindings: add compatible string for Allwinner V3s SoC (git-fixes).
- dt-bindings: arm: Document SoC compatible value for Armadillo-800 EVA (git-fixes).
- dt-bindings: clock: add rk3399 DDR3 standard speed bins (git-fixes).
- dt-bindings: clock: mediatek: add binding for fixed-factor clock axisel_d4 (git-fixes).
- dt-bindings: iio: update STM32 timers clock names (git-fixes).
- dt-bindings: mfd: axp20x: Add AXP806 to supported list of chips (git-fixes).
- dt-bindings: net: Remove duplicate NSP Ethernet MAC binding document (git-fixes).
- dt-bindings: panel: lvds: Fix path to display timing bindings (git-fixes).
- dt-bindings: phy: sun4i-usb-phy: Add property descriptions for H3 (git-fixes).
- dt-bindings: pwm: renesas: tpu: Fix 'compatible' prop description (git-fixes).
- dt-bindings: rcar-dmac: Document missing error interrupt (git-fixes).
- EDAC, {i7core,sb,skx}_edac: Fix uncorrected error counting (bsc#1114279).
- EDAC: Raise the maximum number of memory controllers (bsc#1113780).
- EDAC, skx_edac: Fix logical channel intermediate decoding (bsc#1114279).
- EDAC, thunderx: Fix memory leak in thunderx_l2c_threaded_isr() (bsc#1114279).
- efi: Move some sysfs files to be read-only by root (bsc#1051510).
- ethernet: fman: fix wrong of_node_put() in probe function (bsc#1119017).
- exportfs: fix 'passing zero to ERR_PTR()' warning (bsc#1118773).
- ext2: fix potential use after free (bsc#1118775).
- ext4: add missing brelse() add_new_gdb_meta_bg()'s error path (bsc#1117795).
- ext4: add missing brelse() in set_flexbg_block_bitmap()'s error path (bsc#1117794).
- ext4: add missing brelse() update_backups()'s error path (bsc#1117796).
- ext4: avoid buffer leak in ext4_orphan_add() after prior errors (bsc#1117802).
- ext4: avoid buffer leak on shutdown in ext4_mark_iloc_dirty() (bsc#1117801).
- ext4: avoid possible double brelse() in add_new_gdb() on error path (bsc#1118760).
- ext4: avoid potential extra brelse in setup_new_flex_group_blocks() (bsc#1117792).
- ext4: fix buffer leak in __ext4_read_dirblock() on error path (bsc#1117807).
- ext4: fix buffer leak in ext4_xattr_move_to_block() on error path (bsc#1117806).
- ext4: fix EXT4_IOC_GROUP_ADD ioctl (bsc#1120604).
- ext4: fix missing cleanup if ext4_alloc_flex_bg_array() fails while resizing (bsc#1117798).
- ext4: fix possible inode leak in the retry loop of ext4_resize_fs() (bsc#1117799).
- ext4: fix possible leak of sbi->s_group_desc_leak in error path (bsc#1117803).
- ext4: fix possible leak of s_journal_flag_rwsem in error path (bsc#1117804).
- ext4: fix possible use after free in ext4_quota_enable (bsc#1120602).
- ext4: fix setattr project check in fssetxattr ioctl (bsc#1117789).
- ext4: fix use-after-free race in ext4_remount()'s error path (bsc#1117791).
- ext4: initialize retries variable in ext4_da_write_inline_data_begin() (bsc#1117788).
- ext4: missing unlock/put_page() in ext4_try_to_write_inline_data() (bsc#1120603).
- ext4: propagate error from dquot_initialize() in EXT4_IOC_FSSETXATTR (bsc#1117790).
- ext4: release bs.bh before re-using in ext4_xattr_block_find() (bsc#1117805).
- extable: Consolidate *kernel_text_address() functions (bsc#1120092).
- extable: Enable RCU if it is not watching in kernel_text_address() (bsc#1120092).
- fbdev: fbcon: Fix unregister crash when more than one framebuffer (bsc#1113722)
- fbdev: fbmem: behave better with small rotated displays and many CPUs (bsc#1113722)
- fbdev: fix broken menu dependencies (bsc#1113722)
- firmware: add firmware_request_nowarn() - load firmware without warnings ().
- firmware: dcdbas: Add support for WSMT ACPI table (bsc#1089350 ).
- firmware: dcdbas: include linux/io.h (bsc#1089350).
- Fix the breakage of KMP build on x86_64 (bsc#1121017).
- Fix tracing sample code warning (git-fixes).
- floppy: fix race condition in __floppy_read_block_0() (bsc#1051510).
- flow_dissector: do not dissect l4 ports for fragments (networking-stable-18_11_21).
- fscache: fix race between enablement and dropping of object (bsc#1107385).
- fscache: Fix race in fscache_op_complete() due to split atomic_sub & read (Git-fixes).
- fscache: Pass the correct cancelled indications to fscache_op_complete() (Git-fixes).
- fs: dcache: Avoid livelock between d_alloc_parallel and __d_add (git-fixes).
- fs/dcache.c: fix kmemcheck splat at take_dentry_name_snapshot() (git-fixes).
- fs: dcache: Use READ_ONCE when accessing i_dir_seq (git-fixes).
- fs: Do not leak MNT_INTERNAL away from internal mounts (git-fixes).
- fs: fix lost error code in dio_complete (bsc#1118762).
- fs: Make extension of struct super_block transparent (bsc#1117822).
- fsnotify: Fix busy inodes during unmount (bsc#1117822).
- fsnotify: fix ignore mask logic in fsnotify() (bsc#1115074).
- fs/xfs: Use %pS printk format for direct addresses (git-fixes).
- ftrace: Fix debug preempt config name in stack_tracer_{en,dis}able (bsc#1117172).
- ftrace: Fix kmemleak in unregister_ftrace_graph (bsc#1117181).
- ftrace: Fix memleak when unregistering dynamic ops when tracing disabled (bsc#1117174).
- ftrace: Remove incorrect setting of glob search field (bsc#1117184).
- fuse: fix blocked_waitq wakeup (git-fixes).
- fuse: fix leaked notify reply (git-fixes).
- fuse: fix possibly missed wake-up after abort (git-fixes).
- fuse: Fix use-after-free in fuse_dev_do_read() (git-fixes).
- fuse: Fix use-after-free in fuse_dev_do_write() (git-fixes).
- fuse: fix use-after-free in fuse_direct_IO() (git-fixes).
- fuse: set FR_SENT while locked (git-fixes).
- gcc-plugins: Add include required by GCC release 8 (git-fixes).
- gcc-plugins: Use dynamic initializers (git-fixes).
- genirq: Fix race on spurious interrupt detection (bsc#1051510).
- getname_kernel() needs to make sure that ->name != ->iname in long case (git-fixes).
- gfs2: Do not leave s_fs_info pointing to freed memory in init_sbd (bsc#1118769).
- gfs2: Fix loop in gfs2_rbm_find (bsc#1120601).
- gfs2: Get rid of potential double-freeing in gfs2_create_inode (bsc#1120600).
- gfs2_meta: ->mount() can get NULL dev_name (bsc#1118768).
- gfs2: Put bitmap buffers in put_super (bsc#1118772).
- git_sort.py: Remove non-existent remote tj/libata
- gpio: davinci: Remove unused member of davinci_gpio_controller (git-fixes).
- gpio: do not free unallocated ida on gpiochip_add_data_with_key() error path (bsc#1051510).
- gpiolib-acpi: Only defer request_irq for GpioInt ACPI event handlers (bsc#1051510).
- gpiolib: Fix return value of gpio_to_desc() stub if !GPIOLIB (bsc#1051510).
- gpio: max7301: fix driver for use with CONFIG_VMAP_STACK (bsc#1051510).
- gpio: mvebu: only fail on missing clk if pwm is actually to be used (bsc#1051510).
- grace: replace BUG_ON by WARN_ONCE in exit_net hook (git-fixes).
- gso_segment: Reset skb->mac_len after modifying network header (networking-stable-18_09_24).
- hid: Add quirk for Primax PIXART OEM mice (bsc#1119410).
- hid: hiddev: fix potential Spectre v1 (bsc#1051510).
- hid: input: Ignore battery reported by Symbol DS4308 (bsc#1051510).
- hid: multitouch: Add pointstick support for Cirque Touchpad (bsc#1051510).
- hid: uhid: forbid UHID_CREATE under KERNEL_DS or elevated privileges (bsc#1051510).
- hv_netvsc: ignore devices that are not PCI (networking-stable-18_09_11).
- hwmon: (core) Fix double-free in __hwmon_device_register() (bsc#1051510).
- hwmon: (ibmpowernv) Remove bogus __init annotations (bsc#1051510).
- hwmon: (ina2xx) Fix current value calculation (bsc#1051510).
- hwmon (ina2xx) Fix NULL id pointer in probe() (bsc#1051510).
- hwmon: (nct6775) Fix potential Spectre v1 (bsc#1051510).
- hwmon: (pmbus) Fix page count auto-detection (bsc#1051510).
- hwmon: (pwm-fan) Set fan speed to 0 on suspend (bsc#1051510).
- hwmon: (raspberrypi) Fix initial notify (bsc#1051510).
- hwmon: (w83795) temp4_type has writable permission (bsc#1051510).
- hwpoison, memory_hotplug: allow hwpoisoned pages to be offlined (bnc#1116336).
- hwrng: core - document the quality field (bsc#1051510).
- i2c: axxia: properly handle master timeout (bsc#1051510).
- i2c: scmi: Fix probe error on devices with an empty SMB0001 ACPI device node (bsc#1051510).
- IB/hfi1: Add mtu check for operational data VLs (bsc#1060463 ).
- ibmvnic: Convert reset work item mutex to spin lock ().
- ibmvnic: fix accelerated VLAN handling ().
- ibmvnic: fix index in release_rx_pools (bsc#1115440, bsc#1115433).
- ibmvnic: Fix non-atomic memory allocation in IRQ context ().
- ibmvnic: remove ndo_poll_controller ().
- ibmvnic: Update driver queues after change in ring size support ().
- IB/rxe: support for 802.1q VLAN on the listener (bsc#1082387).
- ieee802154: 6lowpan: set IFLA_LINK (bsc#1051510).
- ieee802154: at86rf230: switch from BUG_ON() to WARN_ON() on problem (bsc#1051510).
- ieee802154: at86rf230: use __func__ macro for debug messages (bsc#1051510).
- ieee802154: fakelb: switch from BUG_ON() to WARN_ON() on problem (bsc#1051510).
- iio: accel: adxl345: convert address field usage in iio_chan_spec (bsc#1051510).
- iio: ad5064: Fix regulator handling (bsc#1051510).
- iio: adc: at91: fix acking DRDY irq on simple conversions (bsc#1051510).
- iio: adc: at91: fix wrong channel number in triggered buffer mode (bsc#1051510).
- iio: adc: imx25-gcq: Fix leak of device_node in mx25_gcq_setup_cfgs() (bsc#1051510).
- iio:st_magn: Fix enable device after trigger (bsc#1051510).
- ima: fix showing large 'violations' or 'runtime_measurements_count' (bsc#1051510).
- include/linux/pfn_t.h: force '~' to be parsed as an unary operator (bsc#1051510).
- Include modules.fips in kernel-binary as well as kernel-binary-base ().
- inet: make sure to grab rcu_read_lock before using ireq->ireq_opt (networking-stable-18_10_16).
- initramfs: fix initramfs rebuilds w/ compression after disabling (git-fixes).
- Input: add official Raspberry Pi's touchscreen driver ().
- Input: cros_ec_keyb - fix button/switch capability reports (bsc#1051510).
- Input: elan_i2c - add ACPI ID for Lenovo IdeaPad 330-15ARR (bsc#1051510).
- Input: elan_i2c - add ACPI ID for Lenovo IdeaPad 330-15IGM (bsc#1051510).
- Input: elan_i2c - add ELAN0620 to the ACPI table (bsc#1051510).
- Input: elan_i2c - add support for ELAN0621 touchpad (bsc#1051510).
- Input: hyper-v - fix wakeup from suspend-to-idle (bsc#1051510).
- Input: matrix_keypad - check for errors from of_get_named_gpio() (bsc#1051510).
- Input: nomadik-ske-keypad - fix a loop timeout test (bsc#1051510).
- Input: omap-keypad - fix keyboard debounce configuration (bsc#1051510).
- Input: synaptics - add PNP ID for ThinkPad P50 to SMBus (bsc#1051510).
- Input: synaptics - avoid using uninitialized variable when probing (bsc#1051510).
- Input: synaptics - enable SMBus for HP 15-ay000 (bsc#1051510).
- Input: xpad - add PDP device id 0x02a4 (bsc#1051510).
- Input: xpad - add support for Xbox1 PDP Camo series gamepad (bsc#1051510).
- Input: xpad - avoid using __set_bit() for capabilities (bsc#1051510).
- Input: xpad - fix some coding style issues (bsc#1051510).
- Input: xpad - quirk all PDP Xbox One gamepads (bsc#1051510).
- integrity/security: fix digsig.c build error with header file (bsc#1051510).
- intel_th: msu: Fix an off-by-one in attribute store (bsc#1051510).
- iommu/amd: Fix amd_iommu=force_isolation (bsc#1106105).
- iommu/arm-smmu: Ensure that page-table updates are visible before TLBI (bsc#1106237).
- iommu/ipmmu-vmsa: Fix crash on early domain free (bsc#1106105).
- iommu/vt-d: Fix NULL pointer dereference in prq_event_thread() (bsc#1106105).
- iommu/vt-d: Handle domain agaw being less than iommu agaw (bsc#1106105).
- iommu/vt-d: Use memunmap to free memremap (bsc#1106105).
- ip6_tunnel: be careful when accessing the inner header (networking-stable-18_10_16).
- ip6_tunnel: Fix encapsulation layout (networking-stable-18_11_02).
- ip6_vti: fix a null pointer deference when destroy vti6 tunnel (networking-stable-18_09_11).
- ipmi: Fix timer race with module unload (bsc#1051510).
- ip_tunnel: be careful when accessing the inner header (networking-stable-18_10_16).
- ip_tunnel: do not force DF when MTU is locked (networking-stable-18_11_21).
- ipv4: lock mtu in fnhe when received PMTU < net.ipv4.route.min_pmtu (networking-stable-18_11_21).
- ipv4: tcp: send zero IPID for RST and ACK sent in SYN-RECV and TIME-WAIT state (networking-stable-18_09_11).
- ipv6: Fix PMTU updates for UDP/raw sockets in presence of VRF (networking-stable-18_11_21).
- ipv6: fix possible use-after-free in ip6_xmit() (networking-stable-18_09_24).
- ipv6: mcast: fix a use-after-free in inet6_mc_check (networking-stable-18_11_02).
- ipv6/ndisc: Preserve IPv6 control buffer if protocol error handlers are called (networking-stable-18_11_02).
- ipv6: take rcu lock in rawv6_send_hdrinc() (networking-stable-18_10_16).
- iwlwifi: add new cards for 9560, 9462, 9461 and killer series (bsc#1051510).
- iwlwifi: dbg: allow wrt collection before ALIVE (bsc#1051510).
- iwlwifi: do not WARN on trying to dump dead firmware (bsc#1051510).
- iwlwifi: fix LED command capability bit (bsc#1119086).
- iwlwifi: fix non_shared_ant for 22000 devices (bsc#1119086).
- iwlwifi: fix wrong WGDS_WIFI_DATA_SIZE (bsc#1119086).
- iwlwifi: mvm: check for short GI only for OFDM (bsc#1051510).
- iwlwifi: mvm: check return value of rs_rate_from_ucode_rate() (bsc#1051510).
- iwlwifi: mvm: do not send GEO_TX_POWER_LIMIT to old firmwares (bsc#1119086).
- iwlwifi: mvm: do not use SAR Geo if basic SAR is not used (bsc#1051510).
- iwlwifi: mvm: fix BAR seq ctrl reporting (bsc#1051510).
- iwlwifi: mvm: fix regulatory domain update when the firmware starts (bsc#1051510).
- iwlwifi: mvm: support sta_statistics() even on older firmware (bsc#1051510).
- iwlwifi: nvm: get num of hw addresses from firmware (bsc#1119086).
- iwlwifi: pcie: avoid empty free RB queue (bsc#1051510).
- iwlwifi: pcie: do not reset TXQ write pointer (bsc#1051510).
- jffs2: free jffs2_sb_info through jffs2_kill_sb() (bsc#1118767).
- jump_label: Split out code under the hotplug lock (bsc#1106913).
- kabi: hide new member in struct iommu_table from genksyms (bsc#1061840).
- kabi: hwpoison, memory_hotplug: allow hwpoisoned pages to be offlined (bnc#1116336).
- kabi: mask raw in struct bpf_reg_state (bsc#1083647).
- kabi: powerpc: export __find_linux_pte as __find_linux_pte_or_hugepte (bsc#1061840).
- kabi: powerpc: Revert npu callback signature change (bsc#1055120).
- kabi protect hnae_ae_ops (bsc#1104353).
- kabi/severities: ignore __xive_vm_h_* KVM internal symbols.
- kbuild: allow to use GCC toolchain not in Clang search path (git-fixes).
- kbuild: fix # escaping in .cmd files for future Make (git-fixes).
- kbuild: fix kernel/bounds.c 'W=1' warning (bsc#1051510).
- kbuild: fix linker feature test macros when cross compiling with Clang (git-fixes).
- kbuild: make missing $DEPMOD a Warning instead of an Error (git-fixes).
- kbuild: move '_all' target out of $(KBUILD_SRC) conditional (bsc#1114279).
- kbuild: rpm-pkg: keep spec file until make mrproper (git-fixes).
- kbuild: suppress packed-not-aligned warning for default setting only (git-fixes).
- kbuild: verify that $DEPMOD is installed (git-fixes).
- kdb: use memmove instead of overlapping memcpy (bsc#1120954).
- kernfs: Replace strncpy with memcpy (bsc#1120053).
- kernfs: update comment about kernfs_path() return value (bsc#1051510).
- keys: Fix the use of the C++ keyword 'private' in uapi/linux/keyctl.h (Git-fixes).
- kgdboc: Passing ekgdboc to command line causes panic (bsc#1051510).
- kobject: Replace strncpy with memcpy (git-fixes).
- kprobes: Make list and blacklist root user read only (git-fixes).
- kvm: arm/arm64: Introduce vcpu_el1_is_32bit (bsc#1110998).
- kvm: nVMX: Always reflect #NM VM-exits to L1 (bsc#1106240).
- kvm: nVMX: move check_vmentry_postreqs() call to nested_vmx_enter_non_root_mode() (bsc#1106240).
- kvm: PPC: Add pt_regs into kvm_vcpu_arch and move vcpu->arch.gpr[] into it (bsc#1061840).
- kvm: PPC: Avoid marking DMA-mapped pages dirty in real mode (bsc#1061840).
- kvm: PPC: Book3S: Add MMIO emulation for VMX instructions (bsc#1061840).
- kvm: PPC: Book3S: Allow backing bigger guest IOMMU pages with smaller physical pages (bsc#1061840).
- kvm: PPC: Book3S: Check KVM_CREATE_SPAPR_TCE_64 parameters (bsc#1061840).
- kvm: PPC: Book3S: Eliminate some unnecessary checks (bsc#1061840).
- kvm: PPC: Book3S: Fix compile error that occurs with some gcc versions (bsc#1061840).
- kvm: PPC: Book3S: Fix matching of hardware and emulated TCE tables (bsc#1061840).
- kvm: PPC: Book3S HV: Add of_node_put() in success path (bsc#1061840).
- kvm: PPC: Book3S HV: Add 'online' register to ONE_REG interface (bsc#1061840).
- kvm: PPC: Book3S HV: Allow creating max number of VCPUs on POWER9 (bsc#1061840).
- kvm: PPC: Book3S HV: Allow HPT and radix on the same core for POWER9 v2.2 (bsc#1061840).
- kvm: PPC: Book3S HV: Avoid crash from THP collapse during radix page fault (bsc#1061840).
- kvm: PPC: Book3S HV: Avoid shifts by negative amounts (bsc#1061840).
- kvm: PPC: Book3S HV: Check DR not IR to chose real vs virt mode MMIOs (bsc#1061840).
- kvm: PPC: Book3S HV: Do not truncate HPTE index in xlate function (bsc#1061840).
- kvm: PPC: Book3S HV: Do not use compound_order to determine host mapping size (bsc#1061840).
- kvm: PPC: Book3S HV: Do not use existing 'prodded' flag for XIVE escalations (bsc#1061840).
- kvm: PPC: Book 3S HV: Do ptesync in radix guest exit path (bsc#1061840).
- kvm: PPC: Book3S HV: Do SLB load/unload with guest LPCR value loaded (bsc#1061840).
- kvm: PPC: Book3S HV: Enable migration of decrementer register (bsc#1061840).
- kvm: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm (bsc#1061840).
- kvm: PPC: Book3S HV: Fix conditions for starting vcpu (bsc#1061840).
- kvm: PPC: Book3S HV: Fix constant size warning (bsc#1061840).
- kvm: PPC: Book3S HV: Fix duplication of host SLB entries (bsc#1061840).
- kvm: PPC: Book3S HV: Fix guest r11 corruption with POWER9 TM workarounds (bsc#1061840).
- kvm: PPC: Book3S HV: Fix handling of large pages in radix page fault handler (bsc#1061840).
- kvm: PPC: Book3S HV: Fix handling of secondary HPTEG in HPT resizing code (bsc#1061840).
- kvm: PPC: Book3S HV: Fix inaccurate comment (bsc#1061840).
- kvm: PPC: Book3S HV: Fix kvmppc_bad_host_intr for real mode interrupts (bsc#1061840).
- kvm: PPC: Book3S HV: Fix trap number return from __kvmppc_vcore_entry (bsc#1061840).
- kvm: PPC: Book3S HV: Fix typo in kvmppc_hv_get_dirty_log_radix() (bsc#1061840).
- kvm: PPC: Book3S HV: Fix VRMA initialization with 2MB or 1GB memory backing (bsc#1061840).
- kvm: PPC: Book3S HV: Handle 1GB pages in radix page fault handler (bsc#1061840).
- kvm: PPC: Book3S HV: Improve handling of debug-trigger HMIs on POWER9 (bsc#1061840).
- kvm: PPC: Book3S HV: Keep XIVE escalation interrupt masked unless ceded (bsc#1061840).
- kvm: PPC: Book3S HV: Lockless tlbie for HPT hcalls (bsc#1061840).
- kvm: PPC: Book3S HV: Make HPT resizing work on POWER9 (bsc#1061840).
- kvm: PPC: Book3S HV: Make radix clear pte when unmapping (bsc#1061840).
- kvm: PPC: Book3S HV: Make radix use correct tlbie sequence in kvmppc_radix_tlbie_page (bsc#1061840).
- kvm: PPC: Book3S HV: Make xive_pushed a byte, not a word (bsc#1061840).
- kvm: PPC: Book3S HV: Pack VCORE IDs to access full VCPU ID space (bsc#1061840).
- kvm: PPC: Book3S HV: radix: Do not clear partition PTE when RC or write bits do not match (bsc#1061840).
- kvm: PPC: Book3S HV: Radix page fault handler optimizations (bsc#1061840).
- kvm: PPC: Book3S HV: radix: Refine IO region partition scope attributes (bsc#1061840).
- kvm: PPC: Book3S HV: Read kvm->arch.emul_smt_mode under kvm->lock (bsc#1061840).
- kvm: PPC: Book3S HV: Recursively unmap all page table entries when unmapping (bsc#1061840).
- kvm: PPC: Book3S HV: Remove useless statement (bsc#1061840).
- kvm: PPC: Book3S HV: Remove vcpu->arch.dec usage (bsc#1061840).
- kvm: PPC: Book3S HV: Send kvmppc_bad_interrupt NMIs to Linux handlers (bsc#1061840).
- kvm: PPC: Book3S HV: Set RWMR on POWER8 so PURR/SPURR count correctly (bsc#1061840).
- kvm: PPC: Book3S HV: Snapshot timebase offset on guest entry (bsc#1061840).
- kvm: PPC: Book3S HV: Streamline setting of reference and change bits (bsc#1061840).
- kvm: PPC: Book3S HV: Use a helper to unmap ptes in the radix fault path (bsc#1061840).
- kvm: PPC: Book3S HV: Use __gfn_to_pfn_memslot() in page fault handler (bsc#1061840).
- kvm: PPC: Book3S HV: XIVE: Resend re-routed interrupts on CPU priority change (bsc#1061840).
- kvm: PPC: Book3S PR: Add guest MSR parameter for kvmppc_save_tm()/kvmppc_restore_tm() (bsc#1061840).
- kvm: PPC: Book3S PR: Enable use on POWER9 inside HPT-mode guests (bsc#1118484).
- kvm: PPC: Book3S PR: Move kvmppc_save_tm/kvmppc_restore_tm to separate file (bsc#1061840).
- kvm: PPC: Book3S: Use correct page shift in H_STUFF_TCE (bsc#1061840).
- kvm: PPC: Fix a mmio_host_swabbed uninitialized usage issue (bsc#1061840).
- kvm: PPC: Make iommu_table::it_userspace big endian (bsc#1061840).
- kvm: PPC: Move nip/ctr/lr/xer registers to pt_regs in kvm_vcpu_arch (bsc#1061840).
- kvm: PPC: Use seq_puts() in kvmppc_exit_timing_show() (bsc#1061840).
- kvm: s390: vsie: copy wrapping keys to right place (git-fixes).
- kvm: svm: Ensure an IBPB on all affected CPUs when freeing a vmcb (bsc#1114279).
- kvm: VMX: re-add ple_gap module parameter (bsc#1106240).
- kvm: x86: Fix kernel info-leak in KVM_HC_CLOCK_PAIRING hypercall (bsc#1106240).
- libata: whitelist all SAMSUNG MZ7KM* solid-state disks (bsc#1051510).
- libceph: bump CEPH_MSG_MAX_DATA_LEN (bsc#1114839).
- libceph: fall back to sendmsg for slab pages (bsc#1118316).
- libertas: do not set URB_ZERO_PACKET on IN USB transfer (bsc#1051510).
- libertas_tf: prevent underflow in process_cmdrequest() (bsc#1119086).
- libnvdimm, dimm: Maximize label transfer size (bsc#1111921, bsc#1113408, bsc#1113972).
- libnvdimm: Hold reference on parent while scheduling async init (bsc#1116891).
- libnvdimm, label: change nvdimm_num_label_slots per UEFI 2.7 (bsc#1111921, bsc#1113408, bsc#1113972).
- libnvdimm, label: Fix sparse warning (bsc#1111921, bsc#1113408, bsc#1113972).
- libnvdimm, pfn: Pad pfn namespaces relative to other regions (bsc#1118962).
- libnvdimm, region: Fail badblocks listing for inactive regions (bsc#1116899).
- lib/raid6: Fix arm64 test build (bsc#1051510).
- lib/ubsan.c: do not mark __ubsan_handle_builtin_unreachable as noreturn (bsc#1051510).
- Limit max FW API version for QCA9377 (bsc#1121714, bsc#1121715).
- linux/bitmap.h: fix type of nbits in bitmap_shift_right() (bsc#1051510).
- livepatch: create and include UAPI headers ().
- llc: set SOCK_RCU_FREE in llc_sap_add_socket() (networking-stable-18_11_02).
- lockd: fix 'list_add double add' caused by legacy signal interface (git-fixes).
- locking/barriers: Convert users of lockless_dereference() to READ_ONCE() (Git-fixes).
- locking/static_keys: Improve uninitialized key warning (bsc#1106913).
- mac80211: Always report TX status (bsc#1051510).
- mac80211: Clear beacon_int in ieee80211_do_stop (bsc#1051510).
- mac80211: fix reordering of buffered broadcast packets (bsc#1051510).
- mac80211: fix TX status reporting for ieee80211s (bsc#1051510).
- mac80211_hwsim: do not omit multicast announce of first added radio (bsc#1051510).
- mac80211_hwsim: fix module init error paths for netlink (bsc#1051510).
- mac80211_hwsim: Timer should be initialized before device registered (bsc#1051510).
- mac80211: ignore NullFunc frames in the duplicate detection (bsc#1051510).
- mac80211: ignore tx status for PS stations in ieee80211_tx_status_ext (bsc#1051510).
- mac80211: TDLS: fix skb queue/priority assignment (bsc#1051510).
- mach64: fix display corruption on big endian machines (bsc#1113722)
- mach64: fix image corruption due to reading accelerator registers (bsc#1113722)
- mailbox: PCC: handle parse error (bsc#1051510).
- make sure that __dentry_kill() always invalidates d_seq, unhashed or not (git-fixes).
- Mark HI and TASKLET softirq synchronous (git-fixes).
- md: allow metadata updates while suspending an array - fix (git-fixes).
- MD: fix invalid stored role for a disk - try2 (git-fixes).
- md: fix NULL dereference of mddev->pers in remove_and_add_spares() (git-fixes).
- md: fix raid10 hang issue caused by barrier (git-fixes).
- md/raid10: fix that replacement cannot complete recovery after reassemble (git-fixes).
- md/raid1: add error handling of read error from FailFast device (git-fixes).
- md/raid5-cache: disable reshape completely (git-fixes).
- md/raid5: fix data corruption of replacements after originals dropped (git-fixes).
- media: cx231xx: fix potential sign-extension overflow on large shift (bsc#1051510).
- media: dvb: fix compat ioctl translation (bsc#1051510).
- media: em28xx: fix input name for Terratec AV 350 (bsc#1051510).
- media: em28xx: Fix use-after-free when disconnecting (bsc#1051510).
- media: em28xx: make v4l2-compliance happier by starting sequence on zero (bsc#1051510).
- media: em28xx: use a default format if TRY_FMT fails (bsc#1051510).
- media: omap3isp: Unregister media device as first (bsc#1051510).
- media: pci: cx23885: handle adding to list failure (bsc#1051510).
- media: tvp5150: avoid going past array on v4l2_querymenu() (bsc#1051510).
- media: tvp5150: fix switch exit in set control handler (bsc#1051510).
- media: tvp5150: fix width alignment during set_selection() (bsc#1051510).
- media: uvcvideo: Fix uvc_alloc_entity() allocation alignment (bsc#1051510).
- media: v4l2-tpg: fix kernel oops when enabling HFLIP and OSD (bsc#1051510).
- media: vsp1: Fix YCbCr planar formats pitch calculation (bsc#1051510).
- memory_hotplug: cond_resched in __remove_pages (bnc#1114178).
- mfd: arizona: Correct calling of runtime_put_sync (bsc#1051510).
- mfd: menelaus: Fix possible race condition and leak (bsc#1051510).
- mfd: omap-usb-host: Fix dts probe of children (bsc#1051510).
- mlxsw: spectrum: Fix IP2ME CPU policer configuration (networking-stable-18_11_21).
- mmc: bcm2835: reset host on timeout (bsc#1051510).
- mmc: core: Allow BKOPS and CACHE ctrl even if no HPI support (bsc#1051510).
- mmc: core: Reset HPI enabled state during re-init and in case of errors (bsc#1051510).
- mmc: core: Use a minimum 1600ms timeout when enabling CACHE ctrl (bsc#1051510).
- mmc: dw_mmc-bluefield: Add driver extension (bsc#1118752).
- mmc: dw_mmc-k3: add sd support for hi3660 (bsc#1118752).
- mmc: dw_mmc-rockchip: correct property names in debug (bsc#1051510).
- mmc: OMAP: fix broken MMC on OMAP15XX/OMAP5910/OMAP310 (bsc#1051510).
- mmc: omap_hsmmc: fix DMA API warning (bsc#1051510).
- mmc: sdhci: fix the timeout check window for clock and reset (bsc#1051510).
- mmc: sdhci-pci-o2micro: Add quirk for O2 Micro dev 0x8620 rev 0x01 (bsc#1051510).
- mm: do not miss the last page because of round-off error (bnc#1118798).
- mm: do not warn about large allocations for slab (git fixes (slab)).
- mm: handle no memcg case in memcg_kmem_charge() properly (bnc#1113677).
- mm/huge_memory.c: reorder operations in __split_huge_page_tail() (VM Functionality bsc#1119962).
- mm/huge_memory: fix lockdep complaint on 32-bit i_size_read() (VM Functionality, bsc#1121599).
- mm/huge_memory: rename freeze_page() to unmap_page() (VM Functionality, bsc#1121599).
- mm/huge_memory: splitting set mapping+index before unfreeze (VM Functionality, bsc#1121599).
- mm: hugetlb: yield when prepping struct pages (git fixes (memory initialisation)).
- mm/khugepaged: collapse_shmem() do not crash on Compound (VM Functionality, bsc#1121599).
- mm/khugepaged: collapse_shmem() remember to clear holes (VM Functionality, bsc#1121599).
- mm/khugepaged: collapse_shmem() stop if punched or truncated (VM Functionality, bsc#1121599).
- mm/khugepaged: collapse_shmem() without freezing new_page (VM Functionality, bsc#1121599).
- mm/khugepaged: fix crashes due to misaccounted holes (VM Functionality, bsc#1121599).
- mm/khugepaged: minor reorderings in collapse_shmem() (VM Functionality, bsc#1121599).
- mm: lower the printk loglevel for __dump_page messages (generic hotplug debugability).
- mm, memory_hotplug: be more verbose for memory offline failures (generic hotplug debugability).
- mm, memory_hotplug: drop pointless block alignment checks from __offline_pages (generic hotplug debugability).
- mm, memory_hotplug: print reason for the offlining failure (generic hotplug debugability).
- mm: migration: fix migration of huge PMD shared pages (bnc#1086423).
- mm: only report isolation failures when offlining memory (generic hotplug debugability).
- mm: print more information about mapping in __dump_page (generic hotplug debugability).
- mm: put_and_wait_on_page_locked() while page is migrated (bnc#1109272).
- mm: rework memcg kernel stack accounting (bnc#1113677).
- mm: sections are not offlined during memory hotremove (bnc#1119968).
- mm: shmem.c: Correctly annotate new inodes for lockdep (Git fixes: shmem).
- mm/vmstat.c: fix NUMA statistics updates (git fixes).
- modpost: ignore livepatch unresolved relocations ().
- mount: Do not allow copying MNT_UNBINDABLE|MNT_LOCKED mounts (bsc#1117819).
- mount: Prevent MNT_DETACH from disconnecting locked mounts (bsc#1117820).
- mount: Retest MNT_LOCKED in do_umount (bsc#1117818).
- Move dell_rbu fix to sorted section (bsc#1087978).
- mtd: cfi: convert inline functions to macros (git-fixes).
- mtd: Fix comparison in map_word_andequal() (git-fixes).
- namei: allow restricted O_CREAT of FIFOs and regular files (bsc#1118766).
- nbd: do not allow invalid blocksize settings (Git-fixes).
- neighbour: confirm neigh entries when ARP packet is received (networking-stable-18_09_24).
- net/af_iucv: drop inbound packets with invalid flags (bnc#1113501, LTC#172679).
- net/af_iucv: fix skb handling on HiperTransport xmit error (bnc#1113501, LTC#172679).
- net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT (networking-stable-18_09_24).
- net: aquantia: memory corruption on jumbo frames (networking-stable-18_10_16).
- net: bcmgenet: Poll internal PHY for GENETv5 (networking-stable-18_11_02).
- net: bcmgenet: protect stop from timeout (networking-stable-18_11_21).
- net: bcmgenet: use MAC link status for fixed phy (networking-stable-18_09_11).
- net: bgmac: Fix endian access in bgmac_dma_tx_ring_free() (bsc#1051510).
- net: bridge: remove ipv6 zero address check in mcast queries (git-fixes).
- net: dsa: bcm_sf2: Call setup during switch resume (networking-stable-18_10_16).
- net: dsa: bcm_sf2: Fix unbind ordering (networking-stable-18_10_16).
- net: dsa: mv88e6xxx: Fix binding documentation for MDIO busses (git-fixes).
- net: dsa: qca8k: Add QCA8334 binding documentation (git-fixes).
- net: ena: add functions for handling Low Latency Queues in ena_com (bsc#1111696 bsc#1117561).
- net: ena: add functions for handling Low Latency Queues in ena_netdev (bsc#1111696 bsc#1117561).
- net: ena: change rx copybreak default to reduce kernel memory pressure (bsc#1111696 bsc#1117561).
- net: ena: complete host info to match latest ENA spec (bsc#1111696 bsc#1117561).
- net: ena: enable Low Latency Queues (bsc#1111696 bsc#1117561).
- net: ena: explicit casting and initialization, and clearer error handling (bsc#1111696 bsc#1117561).
- net: ena: fix auto casting to boolean (bsc#1111696 bsc#1117561).
- net: ena: fix compilation error in xtensa architecture (bsc#1111696 bsc#1117561).
- net: ena: fix crash during ena_remove() (bsc#1111696 bsc#1117561).
- net: ena: fix crash during failed resume from hibernation (bsc#1111696 bsc#1117561).
- net: ena: fix indentations in ena_defs for better readability (bsc#1111696 bsc#1117561).
- net: ena: Fix Kconfig dependency on X86 (bsc#1111696 bsc#1117561).
- net: ena: fix NULL dereference due to untimely napi initialization (bsc#1111696 bsc#1117561).
- net: ena: fix rare bug when failed restart/resume is followed by driver removal (bsc#1111696 bsc#1117561).
- net: ena: fix warning in rmmod caused by double iounmap (bsc#1111696 bsc#1117561).
- net: ena: introduce Low Latency Queues data structures according to ENA spec (bsc#1111696 bsc#1117561).
- net: ena: limit refill Rx threshold to 256 to avoid latency issues (bsc#1111696 bsc#1117561).
- net: ena: minor performance improvement (bsc#1111696 bsc#1117561).
- net: ena: remove ndo_poll_controller (bsc#1111696 bsc#1117561).
- net: ena: remove redundant parameter in ena_com_admin_init() (bsc#1111696 bsc#1117561).
- net: ena: update driver version from 2.0.1 to 2.0.2 (bsc#1111696 bsc#1117561).
- net: ena: update driver version to 2.0.1 (bsc#1111696 bsc#1117561).
- net: ena: use CSUM_CHECKED device indication to report skb's checksum status (bsc#1111696 bsc#1117561).
- net: fec: do not dump RX FIFO register when not available (networking-stable-18_11_02).
- net-gro: reset skb->pkt_type in napi_reuse_skb() (networking-stable-18_11_21).
- net: hns3: Add nic state check before calling netif_tx_wake_queue (bsc#1104353).
- net: hns3: Add support for hns3_nic_netdev_ops.ndo_do_ioctl (bsc#1104353).
- net: hns3: bugfix for buffer not free problem during resetting (bsc#1104353).
- net: hns3: bugfix for handling mailbox while the command queue reinitialized (bsc#1104353).
- net: hns3: bugfix for hclge_mdio_write and hclge_mdio_read (bsc#1104353).
- net: hns3: bugfix for is_valid_csq_clean_head() (bsc#1104353 ).
- net: hns3: bugfix for reporting unknown vector0 interrupt repeatly problem (bsc#1104353).
- net: hns3: bugfix for rtnl_lock's range in the hclgevf_reset() (bsc#1104353).
- net: hns3: bugfix for the initialization of command queue's spin lock (bsc#1104353).
- net: hns3: Check hdev state when getting link status (bsc#1104353).
- net: hns3: Clear client pointer when initialize client failed or unintialize finished (bsc#1104353).
- net: hns3: Fix cmdq registers initialization issue for vf (bsc#1104353).
- net: hns3: Fix error of checking used vlan id (bsc#1104353 ).
- net: hns3: Fix ets validate issue (bsc#1104353).
- net: hns3: Fix for netdev not up problem when setting mtu (bsc#1104353).
- net: hns3: Fix for out-of-bounds access when setting pfc back pressure (bsc#1104353).
- net: hns3: Fix for packet buffer setting bug (bsc#1104353 ).
- net: hns3: Fix for rx vlan id handle to support Rev 0x21 hardware (bsc#1104353).
- net: hns3: Fix for setting speed for phy failed problem (bsc#1104353).
- net: hns3: Fix for vf vlan delete failed problem (bsc#1104353 ).
- net: hns3: Fix loss of coal configuration while doing reset (bsc#1104353).
- net: hns3: Fix parameter type for q_id in hclge_tm_q_to_qs_map_cfg() (bsc#1104353).
- net: hns3: Fix ping exited problem when doing lp selftest (bsc#1104353).
- net: hns3: Preserve vlan 0 in hardware table (bsc#1104353 ).
- net: hns3: remove unnecessary queue reset in the hns3_uninit_all_ring() (bsc#1104353).
- net: hns3: Set STATE_DOWN bit of hdev state when stopping net (bsc#1104353).
- net: hns: fix for unmapping problem when SMMU is on (networking-stable-18_10_16).
- net: hp100: fix always-true check for link up state (networking-stable-18_09_24).
- net: ibm: fix return type of ndo_start_xmit function ().
- net/ibmnvic: Fix deadlock problem in reset ().
- net/ibmvnic: Fix RTNL deadlock during device reset (bnc#1115431).
- net: ipmr: fix unresolved entry dumps (networking-stable-18_11_02).
- net: ipv4: do not let PMTU updates increase route MTU (git-fixes).
- net/ipv6: Display all addresses in output of /proc/net/if_inet6 (networking-stable-18_10_16).
- net/ipv6: Fix index counter for unicast addresses in in6_dump_addrs (networking-stable-18_11_02).
- netlabel: check for IPV4MASK in addrinfo_get (networking-stable-18_10_16).
- net: macb: do not disable MDIO bus at open/close time (networking-stable-18_09_11).
- net/mlx4_core: Correctly set PFC param if global pause is turned off (bsc#1046299).
- net/mlx5: Check for error in mlx5_attach_interface (networking-stable-18_09_18).
- net/mlx5e: Fix selftest for small MTUs (networking-stable-18_11_21).
- net/mlx5e: Set vlan masks for all offloaded TC rules (networking-stable-18_10_16).
- net/mlx5: E-Switch, Fix memory leak when creating switchdev mode FDB tables (networking-stable-18_09_18).
- net/mlx5: E-Switch, Fix out of bound access when setting vport rate (networking-stable-18_10_16).
- net/mlx5: Fix debugfs cleanup in the device init/remove flow (networking-stable-18_09_18).
- net/mlx5: Fix use-after-free in self-healing flow (networking-stable-18_09_18).
- net/mlx5: Take only bit 24-26 of wqe.pftype_wq for page fault type (networking-stable-18_11_02).
- net: mvpp2: Extract the correct ethtype from the skb for tx csum offload (networking-stable-18_10_16).
- net: mvpp2: fix a txq_done race condition (networking-stable-18_10_16).
- net/packet: fix packet drop as of virtio gso (networking-stable-18_10_16).
- net: phy: mdio-gpio: Fix working over slow can_sleep GPIOs (networking-stable-18_11_21).
- net: qca_spi: Fix race condition in spi transfers (networking-stable-18_09_18).
- net: qmi_wwan: add Wistron Neweb D19Q1 (bsc#1051510).
- net: sched: action_ife: take reference to meta module (networking-stable-18_09_11).
- net/sched: act_pedit: fix dump of extended layered op (networking-stable-18_09_11).
- net/sched: act_sample: fix NULL dereference in the data path (networking-stable-18_09_24).
- net: sched: Fix for duplicate class dump (networking-stable-18_11_02).
- net: sched: Fix memory exposure from short TCA_U32_SEL (networking-stable-18_09_11).
- net: sched: gred: pass the right attribute to gred_change_table_def() (networking-stable-18_11_02).
- net: smsc95xx: Fix MTU range (networking-stable-18_11_21).
- net: socket: fix a missing-check bug (networking-stable-18_11_02).
- net: stmmac: Fix stmmac_mdio_reset() when building stmmac as modules (networking-stable-18_11_02).
- net: stmmac: Fixup the tail addr setting in xmit path (networking-stable-18_10_16).
- net: systemport: Fix wake-up interrupt race during resume (networking-stable-18_10_16).
- net: systemport: Protect stop from timeout (networking-stable-18_11_21).
- net: udp: fix handling of CHECKSUM_COMPLETE packets (networking-stable-18_11_02).
- net/usb: cancel pending work when unbinding smsc75xx (networking-stable-18_10_16).
- net: usb: r8152: constify usb_device_id (bsc#1119749).
- net: usb: r8152: use irqsave() in USB's complete callback (bsc#1119749).
- nfc: nfcmrvl_uart: fix OF child-node lookup (bsc#1051510).
- nfp: wait for posted reconfigs when disabling the device (networking-stable-18_09_11).
- nfs: Avoid RCU usage in tracepoints (git-fixes).
- nfs: commit direct writes even if they fail partially (git-fixes).
- nfsd4: permit layoutget of executable-only files (git-fixes).
- nfsd: check for use of the closed special stateid (git-fixes).
- nfsd: CLOSE SHOULD return the invalid special stateid for NFSv4.x (x>0) (git-fixes).
- nfsd: deal with revoked delegations appropriately (git-fixes).
- nfsd: Ensure we check stateid validity in the seqid operation checks (git-fixes).
- nfsd: Fix another OPEN stateid race (git-fixes).
- nfsd: fix corrupted reply to badly ordered compound (git-fixes).
- nfsd: fix potential use-after-free in nfsd4_decode_getdeviceinfo (git-fixes).
- nfsd: Fix stateid races between OPEN and CLOSE (git-fixes).
- nfs: do not wait on commit in nfs_commit_inode() if there were no commit requests (git-fixes).
- nfsd: restrict rd_maxcount to svc_max_payload in nfsd_encode_readdir (git-fixes).
- nfs: Ensure we commit after writeback is complete (bsc#1111809).
- nfs: Fix an incorrect type in struct nfs_direct_req (git-fixes).
- nfs: Fix a typo in nfs_rename() (git-fixes).
- nfs: Fix typo in nomigration mount option (git-fixes).
- nfs: Fix unstable write completion (git-fixes).
- nfsv4.0 fix client reference leak in callback (git-fixes).
- nfsv4.1: Fix a potential layoutget/layoutrecall deadlock (git-fixes).
- nfsv4.1 fix infinite loop on I/O (git-fixes).
- nfsv4.1: Fix the client behaviour on NFS4ERR_SEQ_FALSE_RETRY (git-fixes).
- nfsv4.1: Fix up replays of interrupted requests (git-fixes).
- nfsv4: Fix a typo in nfs41_sequence_process (git-fixes).
- nl80211: Fix possible Spectre-v1 for CQM RSSI thresholds (bsc#1051510).
- nl80211: Fix possible Spectre-v1 for NL80211_TXRATE_HT (bsc#1051510).
- nospec: Allow index argument to have const-qualified type (git-fixes)
- nospec: Include <asm/barrier.h> dependency (bsc#1114279).
- nospec: Kill array_index_nospec_mask_check() (git-fixes).
- nvdimm: Clarify comment in sizeof_namespace_index (bsc#1111921, bsc#1113408, bsc#1113972).
- nvdimm: Remove empty if statement (bsc#1111921, bsc#1113408, bsc#1113972).
- nvdimm: Sanity check labeloff (bsc#1111921, bsc#1113408, bsc#1113972).
- nvdimm: Split label init out from the logic for getting config data (bsc#1111921, bsc#1113408, bsc#1113972).
- nvdimm: Use namespace index data to reduce number of label reads needed (bsc#1111921, bsc#1113408, bsc#1113972).
- nvme-fc: resolve io failures during connect (bsc#1116803).
- nvme: Free ctrl device name on init failure ().
- nvme-multipath: zero out ANA log buffer (bsc#1105168).
- nvme: validate controller state before rescheduling keep alive (bsc#1103257).
- objtool: Detect RIP-relative switch table references (bsc#1058115).
- objtool: Detect RIP-relative switch table references, part 2 (bsc#1058115).
- objtool: Fix another switch table detection issue (bsc#1058115).
- objtool: Fix double-free in .cold detection error path (bsc#1058115).
- objtool: Fix GCC 8 cold subfunction detection for aliased functions (bsc#1058115).
- objtool: Fix 'noreturn' detection for recursive sibling calls (bsc#1058115).
- objtool: Fix segfault in .cold detection with -ffunction-sections (bsc#1058115).
- objtool: Support GCC 8's cold subfunctions (bsc#1058115).
- objtool: Support GCC 8 switch tables (bsc#1058115).
- ocfs2: fix a misuse a of brelse after failing ocfs2_check_dir_entry (bsc#1117817).
- ocfs2: fix locking for res->tracking and dlm->tracking_list (bsc#1117816).
- ocfs2: fix ocfs2 read block panic (bsc#1117815).
- ocfs2: free up write context when direct IO failed (bsc#1117821).
- ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent (bsc#1117808).
- of: add helper to lookup compatible child node (bsc#1106110)
- openvswitch: Fix push/pop ethernet validation (networking-stable-18_11_02).
- panic: avoid deadlocks in re-entrant console drivers (bsc#1088386).
- pci: Add ACS quirk for Ampere root ports (bsc#1120058).
- pci: Add ACS quirk for APM X-Gene devices (bsc#1120058).
- pci: Add Device IDs for Intel GPU 'spurious interrupt' quirk (bsc#1051510).
- pci/ASPM: Do not initialize link state when aspm_disabled is set (bsc#1051510).
- pci/ASPM: Fix link_state teardown on device removal (bsc#1051510).
- pci: Convert device-specific ACS quirks from NULL termination to ARRAY_SIZE (bsc#1120058).
- pci: Delay after FLR of Intel DC P3700 NVMe (bsc#1120058).
- pci: Disable Samsung SM961/PM961 NVMe before FLR (bsc#1120058).
- pci: dwc: remove duplicate fix (bsc#1115269)
- pci: Export pcie_has_flr() (bsc#1120058).
- pci: hv: Use effective affinity mask (bsc#1109772).
- pci: imx6: Fix link training status detection in link up check (bsc#1109806).
- pci: iproc: Activate PAXC bridge quirk for more devices (bsc#1120058).
- pci: iproc: Remove PAXC slot check to allow VF support (bsc#1109806).
- pci: Mark Ceton InfiniTV4 INTx masking as broken (bsc#1120058).
- pci: Mark fall-through switch cases before enabling -Wimplicit-fallthrough (bsc#1120058).
- pci: Mark Intel XXV710 NIC INTx masking as broken (bsc#1120058).
- pci/MSI: Warn and return error if driver enables MSI/MSI-X twice (bsc#1051510).
- pci: vmd: Assign vector zero to all bridges (bsc#1109806).
- pci: vmd: Detach resources after stopping root bus (bsc#1109806).
- pci: vmd: White list for fast interrupt handlers (bsc#1109806).
- pcmcia: Implement CLKRUN protocol disabling for Ricoh bridges (bsc#1051510).
- percpu: make this_cpu_generic_read() atomic w.r.t. interrupts (bsc#1114279).
- perf: fix invalid bit in diagnostic entry (git-fixes).
- perf tools: Fix tracing_path_mount proper path (git-fixes).
- pinctrl: at91-pio4: fix has_config check in atmel_pctl_dt_subnode_to_map() (bsc#1051510).
- pinctrl: meson: fix pinconf bias disable (bsc#1051510).
- pinctrl: qcom: spmi-mpp: Fix drive strength setting (bsc#1051510).
- pinctrl: qcom: spmi-mpp: Fix err handling of pmic_mpp_set_mux (bsc#1051510).
- pinctrl: spmi-mpp: Fix pmic_mpp_config_get() to be compliant (bsc#1051510).
- pinctrl: ssbi-gpio: Fix pm8xxx_pin_config_get() to be compliant (bsc#1051510).
- pipe: match pipe_max_size data type with procfs (git-fixes).
- platform-msi: Free descriptors in platform_msi_domain_free() (bsc#1051510).
- platform/x86: acerhdf: Add BIOS entry for Gateway LT31 v1.3307 (bsc#1051510).
- platform/x86: intel_telemetry: report debugfs failure (bsc#1051510).
- pnfs: Always free the session slot on error in nfs4_layoutget_handle_exception (git-fixes).
- pnfs: Do not release the sequence slot until we've processed layoutget on open (git-fixes).
- pnfs: Prevent the layout header refcount going to zero in pnfs_roc() (git-fixes).
- powerpc/64s: consolidate MCE counter increment (bsc#1094244).
- powerpc/64s/hash: Do not use PPC_INVALIDATE_ERAT on CPUs before POWER9 (bsc#1065729).
- powerpc/64s/radix: Fix process table entry cache invalidation (bsc#1055186, git-fixes).
- powerpc/boot: Expose Kconfig symbols to wrapper (bsc#1065729).
- powerpc/boot: Fix build failures with -j 1 (bsc#1065729).
- powerpc/boot: Fix opal console in boot wrapper (bsc#1065729).
- powerpc/kvm/booke: Fix altivec related build break (bsc#1061840).
- powerpc/kvm: Switch kvm pmd allocator to custom allocator (bsc#1061840).
- powerpc/mm: Fix typo in comments (bsc#1065729).
- powerpc/mm/hugetlb: initialize the pagetable cache correctly for hugetlb (bsc#1091800).
- powerpc/mm/keys: Move pte bits to correct headers (bsc#1078248).
- powerpc/mm: Rename find_linux_pte_or_hugepte() (bsc#1061840).
- powerpc/npu-dma.c: Fix crash after __mmu_notifier_register failure (bsc#1055120).
- powerpc/perf: Update raw-event code encoding comment for power8 (bsc#1065729).
- powerpc/pkeys: Fix handling of pkey state across fork() (bsc#1078248, git-fixes).
- powerpc/powernv: Add indirect levels to it_userspace (bsc#1061840).
- powerpc/powernv: Do not select the cpufreq governors (bsc#1065729).
- powerpc/powernv: Fix concurrency issue with npu->mmio_atsd_usage (bsc#1055120).
- powerpc/powernv: Fix opal_event_shutdown() called with interrupts disabled (bsc#1065729).
- powerpc/powernv: Fix save/restore of SPRG3 on entry/exit from stop (idle) (bsc#1055121).
- powerpc/powernv/ioda: Allocate indirect TCE levels on demand (bsc#1061840).
- powerpc/powernv/ioda: Finish removing explicit max window size check (bsc#1061840).
- powerpc/powernv/ioda: Remove explicit max window size check (bsc#1061840).
- powerpc/powernv: Move TCE manupulation code to its own file (bsc#1061840).
- powerpc/powernv/npu: Add lock to prevent race in concurrent context init/destroy (bsc#1055120).
- powerpc/powernv/npu: Do not explicitly flush nmmu tlb (bsc#1055120).
- powerpc/powernv/npu: Fix deadlock in mmio_invalidate() (bsc#1055120).
- powerpc/powernv/npu: Prevent overwriting of pnv_npu2_init_contex() callback parameters (bsc#1055120).
- powerpc/powernv/npu: Use flush_all_mm() instead of flush_tlb_mm() (bsc#1055120).
- powerpc/powernv/pci: Work around races in PCI bridge enabling (bsc#1055120).
- powerpc/powernv: Rework TCE level allocation (bsc#1061840).
- powerpc/pseries: Fix DTL buffer registration (bsc#1065729).
- powerpc/pseries: Fix how we iterate over the DTL entries (bsc#1065729).
- powerpc/pseries: Fix 'OF: ERROR: Bad of_node_put() on /cpus' during DLPAR (bsc#1113295).
- powerpc/pseries/mobility: Extend start/stop topology update scope (bsc#1116950, bsc#1115709).
- powerpc: pseries: remove dlpar_attach_node dependency on full path (bsc#1113295).
- powerpc/pseries: Track LMB nid instead of using device tree (bsc#1108270).
- powerpc/traps: restore recoverability of machine_check interrupts (bsc#1094244).
- powerpc/xive: Move definition of ESB bits (bsc#1061840).
- powerpc/xmon: Add ISA v3.0 SPRs to SPR dump (bsc#1061840).
- power: supply: max8998-charger: Fix platform data retrieval (bsc#1051510).
- power: supply: olpc_battery: correct the temperature units (bsc#1051510).
- pppoe: fix reception of frames with no mac header (networking-stable-18_09_24).
- printk: Fix panic caused by passing log_buf_len to command line (bsc#1117168).
- provide linux/set_memory.h (bsc#1113295).
- ptp: fix Spectre v1 vulnerability (bsc#1051510).
- ptrace: Remove unused ptrace_may_access_sched() and MODE_IBRS (bsc#1106913).
- pwm: lpss: Release runtime-pm reference from the driver's remove callback (bsc#1051510).
- pxa168fb: prepare the clock (bsc#1051510).
- qed: Add driver support for 20G link speed (bsc#1110558).
- qed: Add support for virtual link (bsc#1111795).
- qede: Add driver support for 20G link speed (bsc#1110558).
- qmi_wwan: apply SET_DTR quirk to the SIMCOM shared device ID (bsc#1051510).
- qmi_wwan: Support dynamic config on Quectel EP06 (bsc#1051510).
- r8152: add byte_enable for ocp_read_word function (bsc#1119749).
- r8152: add Linksys USB3GIGV1 id (bsc#1119749).
- r8152: add r8153_phy_status function (bsc#1119749).
- r8152: adjust lpm settings for RTL8153 (bsc#1119749).
- r8152: adjust rtl8153_runtime_enable function (bsc#1119749).
- r8152: adjust the settings about MAC clock speed down for RTL8153 (bsc#1119749).
- r8152: adjust U2P3 for RTL8153 (bsc#1119749).
- r8152: avoid rx queue more than 1000 packets (bsc#1119749).
- r8152: check if disabling ALDPS is finished (bsc#1119749).
- r8152: correct the definition (bsc#1119749).
- r8152: disable RX aggregation on Dell TB16 dock (bsc#1119749).
- r8152: disable RX aggregation on new Dell TB16 dock (bsc#1119749).
- r8152: fix wrong checksum status for received IPv4 packets (bsc#1119749).
- r8152: move calling delay_autosuspend function (bsc#1119749).
- r8152: move the default coalesce setting for RTL8153 (bsc#1119749).
- r8152: move the initialization to reset_resume function (bsc#1119749).
- r8152: move the setting of rx aggregation (bsc#1119749).
- r8152: replace napi_complete with napi_complete_done (bsc#1119749).
- r8152: set rx mode early when linking on (bsc#1119749).
- r8152: split rtl8152_resume function (bsc#1119749).
- r8152: support new chip 8050 (bsc#1119749).
- r8152: support RTL8153B (bsc#1119749).
- r8169: fix NAPI handling under high load (networking-stable-18_11_02).
- race of lockd inetaddr notifiers vs nlmsvc_rqst change (git-fixes).
- raid10 BUG_ON in raise_barrier when force is true and conf->barrier is 0 (git-fixes).
- random: rate limit unseeded randomness warnings (git-fixes).
- rbd: whitelist RBD_FEATURE_OPERATIONS feature bit (Git-fixes).
- rcu: Allow for page faults in NMI handlers (bsc#1120092).
- rdma/bnxt_re: Add missing spin lock initialization (bsc#1050244 ).
- rdma/bnxt_re: Avoid accessing the device structure after it is freed (bsc#1050244).
- rdma/bnxt_re: Avoid NULL check after accessing the pointer (bsc#1086283).
- rdma/bnxt_re: Fix system hang when registration with L2 driver fails (bsc#1086283).
- rdma/hns: Bugfix pbl configuration for rereg mr (bsc#1104427 ).
- rdma_rxe: make rxe work over 802.1q VLAN devices (bsc#1082387).
- rds: fix two RCU related problems (networking-stable-18_09_18).
- remoteproc: qcom: Fix potential device node leaks (bsc#1051510).
- reset: hisilicon: fix potential NULL pointer dereference (bsc#1051510).
- reset: imx7: Fix always writing bits as 0 (bsc#1051510).
- reset: remove remaining WARN_ON() in <linux/reset.h> (Git-fixes).
- resource: Include resource end in walk_*() interfaces (bsc#1114279).
- Revert 'blacklist.conf: blacklist inapplicable commits' This reverts commit 88bd1b2b53990d5518b819968445522fb1392bee. We only build with VIRT_CPU_ACCOUNTING_NATIVE on s390
- Revert 'ceph: fix dentry leak in splice_dentry()' (bsc#1114839).
- Revert commit ef9209b642f 'staging: rtl8723bs: Fix indenting errors and an off-by-one mistake in core/rtw_mlme_ext.c' (bsc#1051510).
- Revert 'iommu/io-pgtable-arm: Check for v7s-incapable systems' (bsc#1106105).
- Revert 'PCI/ASPM: Do not initialize link state when aspm_disabled is set' (bsc#1051510).
- Revert 'powerpc/64: Fix checksum folding in csum_add()' (bsc#1065729).
- Revert 'scsi: lpfc: ls_rjt erroneus FLOGIs' (bsc#1119322).
- Revert 'usb: dwc3: gadget: skip Set/Clear Halt when invalid' (bsc#1051510).
- Revert wlcore patch to follow stable tree develpment
- ring-buffer: Allow for rescheduling when removing pages (bsc#1120238).
- ring-buffer: Do no reuse reader page if still in use (bsc#1120096).
- ring-buffer: Mask out the info bits when returning buffer page length (bsc#1120094).
- rpmsg: Correct support for MODULE_DEVICE_TABLE() (git-fixes).
- rtc: hctosys: Add missing range error reporting (bsc#1051510).
- rtc: m41t80: Correct alarm month range with RTC reads (bsc#1051510).
- rtc: pcf2127: fix a kmemleak caused in pcf2127_i2c_gather_write (bsc#1051510).
- rtc: snvs: Add timeouts to avoid kernel lockups (bsc#1051510).
- rtl8xxxu: Fix missing break in switch (bsc#1051510).
- rtnetlink: Disallow FDB configuration for non-Ethernet device (networking-stable-18_11_02).
- rtnetlink: fix rtnl_fdb_dump() for ndmsg header (networking-stable-18_10_16).
- rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096 (networking-stable-18_10_16).
- s390/cpum_sf: Add data entry sizes to sampling trailer entry (git-fixes).
- s390/dasd: simplify locking in dasd_times_out (bsc#1104967,).
- s390/kdump: Fix elfcorehdr size calculation (bsc#1117953, LTC#171112).
- s390/kdump: Make elfcorehdr size calculation ABI compliant (bsc#1117953, LTC#171112).
- s390/kvm: fix deadlock when killed by oom (bnc#1113501, LTC#172235).
- s390/mm: Check for valid vma before zapping in gmap_discard (git-fixes).
- s390/mm: correct allocate_pgste proc_handler callback (git-fixes).
- s390: qeth_core_mpc: Use ARRAY_SIZE instead of reimplementing its function (bnc#1113501, LTC#172682).
- s390/qeth: fix HiperSockets sniffer (bnc#1113501, LTC#172953).
- s390/qeth: fix length check in SNMP processing (bsc#1117953, LTC#173657).
- s390: qeth: Fix potential array overrun in cmd/rc lookup (bnc#1113501, LTC#172682).
- s390/qeth: handle failure on workqueue creation (git-fixes).
- s390/qeth: remove outdated portname debug msg (bsc#1117953, LTC#172960).
- s390/qeth: report 25Gbit link speed (bnc#1113501, LTC#172959).
- s390/qeth: sanitize strings in debug messages (bsc#1117953, LTC#172960).
- s390: revert ELF_ET_DYN_BASE base changes (git-fixes).
- s390/sclp_tty: enable line mode tty even if there is an ascii console (git-fixes).
- s390/sthyi: add cache to store hypervisor info (LTC#160415, bsc#1068273).
- s390/sthyi: add s390_sthyi system call (LTC#160415, bsc#1068273).
- s390/sthyi: reorganize sthyi implementation (LTC#160415, bsc#1068273).
- sbitmap: fix race in wait batch accounting (Git-fixes).
- sched/core: Fix cpu.max vs. cpuhotplug deadlock (bsc#1106913).
- sched/smt: Expose sched_smt_present static key (bsc#1106913).
- sched/smt: Make sched_smt_present track topology (bsc#1106913).
- sched, tracing: Fix trace_sched_pi_setprio() for deboosting (bsc#1120228).
- scsi: core: Avoid that SCSI device removal through sysfs triggers a deadlock (bsc#1114578).
- scsi: libsas: remove irq save in sas_ata_qc_issue() (bsc#1114580).
- scsi: lpfc: add support to retrieve firmware logs (bsc#1114015).
- scsi: lpfc: add Trunking support (bsc#1114015).
- scsi: lpfc: Cap NPIV vports to 256 (bsc#1118215).
- scsi: lpfc: Correct code setting non existent bits in sli4 ABORT WQE (bsc#1118215).
- scsi: lpfc: Correct errors accessing fw log (bsc#1114015).
- scsi: lpfc: Correct invalid EQ doorbell write on if_type=6 (bsc#1114015).
- scsi: lpfc: Correct irq handling via locks when taking adapter offline (bsc#1114015).
- scsi: lpfc: Correct LCB RJT handling (bsc#1114015).
- scsi: lpfc: Correct loss of fc4 type on remote port address change (bsc#1114015).
- scsi: lpfc: Correct race with abort on completion path (bsc#1114015).
- scsi: lpfc: Correct soft lockup when running mds diagnostics (bsc#1114015).
- scsi: lpfc: Correct speeds on SFP swap (bsc#1114015).
- scsi: lpfc: Correct topology type reporting on G7 adapters (bsc#1118215).
- scsi: lpfc: Defer LS_ACC to FLOGI on point to point logins (bsc#1118215).
- scsi: lpfc: Enable Management features for IF_TYPE=6 (bsc#1119322).
- scsi: lpfc: fcoe: Fix link down issue after 1000+ link bounces (bsc#1114015).
- scsi: lpfc: Fix a duplicate 0711 log message number (bsc#1118215).
- scsi: lpfc: fix block guard enablement on SLI3 adapters (bsc#1079935).
- scsi: lpfc: Fix dif and first burst use in write commands (bsc#1118215).
- scsi: lpfc: Fix discovery failures during port failovers with lots of vports (bsc#1118215).
- scsi: lpfc: Fix driver release of fw-logging buffers (bsc#1118215).
- scsi: lpfc: Fix errors in log messages (bsc#1114015).
- scsi: lpfc: Fix GFT_ID and PRLI logic for RSCN (bsc#1114015).
- scsi: lpfc: Fix kernel Oops due to null pring pointers (bsc#1118215).
- scsi: lpfc: Fix LOGO/PLOGI handling when triggerd by ABTS Timeout event (bsc#1114015).
- scsi: lpfc: Fix lpfc_sli4_read_config return value check (bsc#1114015).
- scsi: lpfc: Fix odd recovery in duplicate FLOGIs in point-to-point (bsc#1114015).
- scsi: lpfc: Fix panic when FW-log buffsize is not initialized (bsc#1118215).
- scsi: lpfc: Implement GID_PT on Nameserver query to support faster failover (bsc#1114015).
- scsi: lpfc: ls_rjt erroneus FLOGIs (bsc#1118215).
- scsi: lpfc: Raise nvme defaults to support a larger io and more connectivity (bsc#1114015).
- scsi: lpfc: raise sg count for nvme to use available sg resources (bsc#1114015).
- scsi: lpfc: reduce locking when updating statistics (bsc#1114015).
- scsi: lpfc: refactor mailbox structure context fields (bsc#1118215).
- scsi: lpfc: Remove set but not used variable 'sgl_size' (bsc#1114015).
- scsi: lpfc: Reset link or adapter instead of doing infinite nameserver PLOGI retry (bsc#1114015).
- scsi: lpfc: rport port swap discovery issue (bsc#1118215).
- scsi: lpfc: Synchronize access to remoteport via rport (bsc#1114015).
- scsi: lpfc: update driver version to 12.0.0.7 (bsc#1114015).
- scsi: lpfc: update driver version to 12.0.0.8 (bsc#1114015).
- scsi: lpfc: update driver version to 12.0.0.9 (bsc#1118215).
- scsi: lpfc: update manufacturer attribute to reflect Broadcom (bsc#1118215).
- scsi: qlogicpti: Fix an error handling path in 'qpti_sbus_probe()' (bsc#1114581).
- scsi: scsi_transport_srp: Fix shost to rport translation (bsc#1114582).
- scsi: sg: fix minor memory leak in error path (bsc#1114584).
- scsi: sysfs: Introduce sysfs_{un,}break_active_protection() (bsc#1114578).
- scsi: target: add emulate_pr backstore attr to toggle PR support (bsc#1091405).
- scsi: target: drop unused pi_prot_format attribute storage (bsc#1091405).
- scsi: target: Fix fortify_panic kernel exception (bsc#1114576).
- scsi: target/tcm_loop: Avoid that static checkers warn about dead code (bsc#1114577).
- scsi: target: tcmu: add read length support (bsc#1097755).
- scsi: zfcp: fix posting too many status read buffers leading to adapter shutdown (bsc#1121483, LTC#174588).
- sctp: fix race on sctp_id2asoc (networking-stable-18_11_02).
- sctp: fix strchange_flags name for Stream Change Event (networking-stable-18_11_21).
- sctp: hold transport before accessing its asoc in sctp_transport_get_next (networking-stable-18_09_11).
- sctp: not allow to set asoc prsctp_enable by sockopt (networking-stable-18_11_21).
- sctp: not increase stream's incnt before sending addstrm_in request (networking-stable-18_11_21).
- sctp: update dst pmtu with the correct daddr (networking-stable-18_10_16).
- serial: 8250: Fix clearing FIFOs in RS485 mode again (bsc#1051510).
- shmem: introduce shmem_inode_acct_block (VM Functionality, bsc#1121599).
- shmem: shmem_charge: verify max_block is not exceeded before inode update (VM Functionality, bsc#1121599).
- skd: Avoid that module unloading triggers a use-after-free (Git-fixes).
- skd: Submit requests to firmware before triggering the doorbell (Git-fixes).
- skip LAYOUTRETURN if layout is invalid (git-fixes).
- soc: bcm2835: sync firmware properties with downstream ()
- soc: fsl: qbman: qman: avoid allocating from non existing gen_pool (bsc#1051510).
- soc/tegra: pmc: Fix child-node lookup (bsc#1051510).
- soc: ti: QMSS: Fix usage of irq_set_affinity_hint (bsc#1051510).
- spi: bcm2835: Avoid finishing transfer prematurely in IRQ mode (bsc#1051510).
- spi: bcm2835: Fix book-keeping of DMA termination (bsc#1051510).
- spi: bcm2835: Fix race on DMA termination (bsc#1051510).
- spi: bcm2835: Unbreak the build of esoteric configs (bsc#1051510).
- spi/bcm63xx-hsspi: keep pll clk enabled (bsc#1051510).
- spi: bcm-qspi: switch back to reading flash using smaller chunks (bsc#1051510).
- spi: sh-msiof: fix deferred probing (bsc#1051510).
- splice: do not read more than available pipe space (bsc#1119212).
- staging: bcm2835-camera: Abort probe if there is no camera (bsc#1051510).
- staging: comedi: ni_mio_common: protect register write overflow (bsc#1051510).
- staging:iio:ad7606: fix voltage scales (bsc#1051510).
- staging: rtl8712: Fix possible buffer overrun (bsc#1051510).
- staging: rtl8723bs: Add missing return for cfg80211_rtw_get_station (bsc#1051510).
- staging: rtl8723bs: Fix the return value in case of error in 'rtw_wx_read32()' (bsc#1051510).
- staging: rts5208: fix gcc-8 logic error warning (bsc#1051510).
- staging: vchiq_arm: fix compat VCHIQ_IOC_AWAIT_COMPLETION (bsc#1051510).
- staging: wilc1000: fix missing read_write setting when reading data (bsc#1051510).
- sunrpc: Allow connect to return EHOSTUNREACH (git-fixes).
- sunrpc: Do not use stack buffer with scatterlist (git-fixes).
- sunrpc: Fix rpc_task_begin trace point (git-fixes).
- sunrpc: Fix tracepoint storage issues with svc_recv and svc_rqst_status (git-fixes).
- supported.conf: add raspberrypi-ts driver
- supported.conf: whitelist bluefield eMMC driver
- target: fix buffer offset in core_scsi3_pri_read_full_status (bsc1117349).
- target/iscsi: avoid NULL dereference in CHAP auth error path (bsc#1117165).
- target: se_dev_attrib.emulate_pr ABI stability (bsc#1091405).
- tcp: do not restart timewait timer on rst reception (networking-stable-18_09_11).
- team: no need to do team_notify_peers or team_mcast_rejoin when disabling port (bsc#1051510).
- termios, tty/tty_baudrate.c: fix buffer overrun (bsc#1051510).
- test_firmware: fix error return getting clobbered (bsc#1051510).
- test_hexdump: use memcpy instead of strncpy (bsc#1051510).
- tg3: Add PHY reset for 5717/5719/5720 in change ring and flow control paths (networking-stable-18_11_21).
- thermal: bcm2835: enable hwmon explicitly (bsc#1108468).
- thermal: da9062/61: Prevent hardware access during system suspend (bsc#1051510).
- thermal: rcar_thermal: Prevent hardware access during system suspend (bsc#1051510).
- tipc: do not assume linear buffer when reading ancillary data (networking-stable-18_11_21).
- tipc: fix a missing rhashtable_walk_exit() (networking-stable-18_09_11).
- tipc: fix flow control accounting for implicit connect (networking-stable-18_10_16).
- tmpfs: make lseek(SEEK_DATA/SEK_HOLE) return ENXIO with a negative offset (bsc#1051510).
- tools build: fix # escaping in .cmd files for future Make (git-fixes).
- tools: hv: fcopy: set 'error' in case an unknown operation was requested (git-fixes).
- tools: hv: include string.h in hv_fcopy_daemon (git-fixes).
- tools/lib/lockdep: Rename 'trywlock' into 'trywrlock' (bsc#1121973).
- tools/power/cpupower: fix compilation with STATIC=true (git-fixes).
- tools/power turbostat: fix possible sprintf buffer overflow (git-fixes).
- tpm2-cmd: allow more attempts for selftest execution (bsc#1082555).
- tpm: add retry logic (bsc#1082555).
- tpm: consolidate the TPM startup code (bsc#1082555).
- tpm: do not suspend/resume if power stays on (bsc#1082555).
- tpm: fix intermittent failure with self tests (bsc#1082555).
- tpm: fix response size validation in tpm_get_random() (bsc#1082555).
- tpm: move endianness conversion of ordinals to tpm_input_header (bsc#1082555).
- tpm: move endianness conversion of TPM_TAG_RQU_COMMAND to tpm_input_header (bsc#1082555).
- tpm: move the delay_msec increment after sleep in tpm_transmit() (bsc#1082555).
- tpm: React correctly to RC_TESTING from TPM 2.0 self tests (bsc#1082555).
- tpm: replace msleep() with usleep_range() in TPM 1.2/2.0 generic drivers (bsc#1082555).
- tpm: Restore functionality to xen vtpm driver (bsc#1082555).
- tpm: self test failure should not cause suspend to fail (bsc#1082555).
- tpm: tpm-interface: fix tpm_transmit/_cmd kdoc (bsc#1082555).
- tpm: Trigger only missing TPM 2.0 self tests (bsc#1082555).
- tpm: Use dynamic delay to wait for TPM 2.0 self test result (bsc#1082555).
- tpm: use tpm2_pcr_read() in tpm2_do_selftest() (bsc#1082555).
- tpm: use tpm_buf functions in tpm2_pcr_read() (bsc#1082555).
- tracing: Apply trace_clock changes to instance max buffer (bsc#1117188).
- tracing/blktrace: Fix to allow setting same value (Git-fixes).
- tracing: Erase irqsoff trace with empty write (bsc#1117189).
- tracing: Fix bad use of igrab in trace_uprobe.c (bsc#1120046).
- tracing: Fix crash when freeing instances with event triggers (bsc#1120230).
- tracing: Fix crash when it fails to alloc ring buffer (bsc#1120097).
- tracing: Fix double free of event_trigger_data (bsc#1120234).
- tracing: Fix missing return symbol in function_graph output (bsc#1120232).
- tracing: Fix possible double free in event_enable_trigger_func() (bsc#1120235).
- tracing: Fix possible double free on failure of allocating trace buffer (bsc#1120214).
- tracing: Fix regex_match_front() to not over compare the test string (bsc#1120223).
- tracing: Fix trace_pipe behavior for instance traces (bsc#1120088).
- tracing: Remove RCU work arounds from stack tracer (bsc#1120092).
- tracing/samples: Fix creation and deletion of simple_thread_fn creation (git-fixes).
- tty: check name length in tty_find_polling_driver() (bsc#1051510).
- tty: Do not block on IO when ldisc change is pending (bnc#1105428).
- tty: Do not hold ldisc lock in tty_reopen() if ldisc present (bsc#1051510).
- tty: Do not return -EAGAIN in blocking read (bsc#1116040).
- tty: do not set TTY_IO_ERROR flag if console port (bsc#1051510).
- tty: fix data race between tty_init_dev and flush of buf (bnc#1105428).
- tty: Hold tty_ldisc_lock() during tty_reopen() (bnc#1105428).
- tty/ldsem: Add lockdep asserts for ldisc_sem (bnc#1105428).
- tty/ldsem: Convert to regular lockdep annotations (bnc#1105428).
- tty/ldsem: Decrement wait_readers on timeouted down_read() (bnc#1105428).
- tty/ldsem: Wake up readers after timed out down_write() (bnc#1105428).
- tty: serial: 8250_mtk: always resume the device in probe (bsc#1051510).
- tty: Simplify tty->count math in tty_reopen() (bnc#1105428).
- tty: wipe buffer (bsc#1051510).
- tty: wipe buffer if not echoing data (bsc#1051510).
- tun: Consistently configure generic netdev params via rtnetlink (bsc#1051510).
- tuntap: fix multiqueue rx (networking-stable-18_11_21).
- ubifs: Handle re-linking of inodes correctly while recovery (bsc#1120598).
- ubifs-Handle-re-linking-of-inodes-correctly-while-re.patch: Fixup compilation failure due to different ubifs_assert() prototype.
- udf: Allow mounting volumes with incorrect identification strings (bsc#1118774).
- udp4: fix IP_CMSG_CHECKSUM for connected sockets (networking-stable-18_09_24).
- udp6: add missing checks on edumux packet processing (networking-stable-18_09_24).
- udp6: fix encap return code for resubmitting (git-fixes).
- uio: ensure class is registered before devices (bsc#1051510).
- uio: Fix an Oops on load (bsc#1051510).
- uio: make symbol 'uio_class_registered' static (bsc#1051510).
- unifdef: use memcpy instead of strncpy (bsc#1051510).
- usb: appledisplay: Add 27' Apple Cinema Display (bsc#1051510).
- usb: cdc-acm: add entry for Hiro (Conexant) modem (bsc#1051510).
- usb: chipidea: Prevent unbalanced IRQ disable (bsc#1051510).
- usb: core: Fix hub port connection events lost (bsc#1051510).
- usb: core: quirks: add RESET_RESUME quirk for Cherry G230 Stream series (bsc#1051510).
- usb: dwc2: host: do not delay retries for CONTROL IN transfers (bsc#1114385).
- usb: dwc2: host: Do not retry NAKed transactions right away (bsc#1114385).
- usb: dwc2: host: use hrtimer for NAK retries (git-fixes).
- usb: dwc3: core: Clean up ULPI device (bsc#1051510).
- usb: dwc3: gadget: fix ISOC TRB type on unaligned transfers (bsc#1051510).
- usb: dwc3: gadget: Properly check last unaligned/zero chain TRB (bsc#1051510).
- usb: gadget: fsl_udc_core: check allocation return value and cleanup on failure (bsc#1051510).
- usb: gadget: fsl_udc_core: fixup struct_udc_setup documentation (bsc#1051510).
- usb: gadget: storage: Fix Spectre v1 vulnerability (bsc#1051510).
- usb: gadget: udc: atmel: handle at91sam9rl PMC (bsc#1051510).
- usb: gadget: u_ether: fix unsafe list iteration (bsc#1051510).
- usb: host: ohci-at91: fix request of irq for optional gpio (bsc#1051510).
- usb: hso: Fix OOB memory access in hso_probe/hso_get_config_data (bsc#1051510).
- usbip: tools: fix atoi() on non-null terminated string (bsc#1051510).
- usbip: vhci_hcd: check rhport before using in vhci_hub_control() (bsc#1090888).
- usbip:vudc: BUG kmalloc-2048 (Not tainted): Poison overwritten (bsc#1051510).
- usb: misc: appledisplay: add 20' Apple Cinema Display (bsc#1051510).
- usbnet: smsc95xx: disable carrier check while suspending (bsc#1051510).
- usb: omap_udc: fix crashes on probe error and module removal (bsc#1051510).
- usb: omap_udc: fix omap_udc_start() on 15xx machines (bsc#1051510).
- usb: omap_udc: fix rejection of out transfers when DMA is used (bsc#1051510).
- usb: omap_udc: fix USB gadget functionality on Palm Tungsten E (bsc#1051510).
- usb: omap_udc: use devm_request_irq() (bsc#1051510).
- usb: quirk: add no-LPM quirk on SanDisk Ultra Flair device (bsc#1051510).
- usb: quirks: Add delay-init quirk for Corsair K70 LUX RGB (bsc#1051510).
- usb: quirks: Add no-lpm quirk for Raydium touchscreens (bsc#1051510).
- usb: serial: cypress_m8: fix interrupt-out transfer length (bsc#1051510).
- usb: serial: option: add Fibocom NL668 series (bsc#1051510).
- usb: serial: option: add GosunCn ZTE WeLink ME3630 (bsc#1051510).
- usb: serial: option: add HP lt4132 (bsc#1051510).
- usb: serial: option: add Simcom SIM7500/SIM7600 (MBIM mode) (bsc#1051510).
- usb: serial: option: add Telit LN940 series (bsc#1051510).
- usb: serial: option: add two-endpoints device-id flag (bsc#1051510).
- usb: serial: option: drop redundant interface-class test (bsc#1051510).
- usb: serial: option: improve Quectel EP06 detection (bsc#1051510).
- usb: usbip: Fix BUG: KASAN: slab-out-of-bounds in vhci_hub_control() (bsc#1106110).
- usb: usb-storage: Add new IDs to ums-realtek (bsc#1051510).
- usb: xhci: fix timeout for transition from RExit to U0 (bsc#1051510).
- usb: xhci: fix uninitialized completion when USB3 port got wrong status (bsc#1051510).
- usb: xhci: Prevent bus suspend if a port connect change or polling state is detected (bsc#1051510).
- userfaultfd: clear the vma->vm_userfaultfd_ctx if UFFD_EVENT_FORK fails (bsc#1118761).
- userfaultfd: remove uffd flags from vma->vm_flags if UFFD_EVENT_FORK fails (bsc#1118809).
- v9fs_dir_readdir: fix double-free on p9stat_read error (bsc#1118771).
- vfs: Avoid softlockups in drop_pagecache_sb() (bsc#1118505).
- vfs: close race between getcwd() and d_move() (git-fixes).
- vfs: fix freeze protection in mnt_want_write_file() for overlayfs (git-fixes).
- vhost: Fix Spectre V1 vulnerability (bsc#1051510).
- vhost/scsi: truncate T10 PI iov_iter to prot_bytes (bsc#1051510).
- virtio_net: avoid using netif_tx_disable() for serializing tx routine (networking-stable-18_11_02).
- VMCI: Resource wildcard match fixed (bsc#1051510).
- w1: omap-hdq: fix missing bus unregister at removal (bsc#1051510).
- watchdog/core: Add missing prototypes for weak functions (git-fixes).
- wireless: airo: potential buffer overflow in sprintf() (bsc#1051510).
- wlcore: Fix the return value in case of error in 'wlcore_vendor_cmd_smart_config_start()' (bsc#1051510).
- Workaround for mysterious NVMe breakage with i915 CFL (bsc#1111040).
- x86/boot/KASLR: Work around firmware bugs by excluding EFI_BOOT_SERVICES_* and EFI_LOADER_* from KASLR's choice (bnc#1112878).
- x86/bugs: Add AMD's SPEC_CTRL MSR usage (bsc#1106913).
- x86/bugs: Fix the AMD SSBD usage of the SPEC_CTRL MSR (bsc#1106913).
- x86/bugs: Switch the selection of mitigation from CPU vendor to CPU features (bsc#1106913).
- x86/corruption-check: Fix panic in memory_corruption_check() when boot option without value is provided (bsc#1110006).
- x86/cpu/vmware: Do not trace vmware_sched_clock() (bsc#1114279).
- x86/decoder: Fix and update the opcodes map (bsc#1058115).
- x86, hibernate: Fix nosave_regions setup for hibernation (bsc#1110006).
- x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772).
- x86/kabi: Fix cpu_tlbstate issue (bsc#1106913).
- x86/kexec: Correct KEXEC_BACKUP_SRC_END off-by-one error (bsc#1114279).
- x86/l1tf: Show actual SMT state (bsc#1106913).
- x86/ldt: Remove unused variable in map_ldt_struct() (bsc#1114279).
- x86/ldt: Split out sanity check in map_ldt_struct() (bsc#1114279).
- x86/ldt: Unmap PTEs for the slot before freeing LDT pages (bsc#1114279).
- x86/MCE/AMD: Fix the thresholding machinery initialization order (bsc#1114279).
- x86/MCE: Make correctable error detection look at the Deferred bit (bsc#1114279).
- x86/mm: Fix decoy address handling vs 32-bit builds (bsc#1120606).
- x86/mm/pat: Disable preemption around __flush_tlb_all() (bsc#1114279).
- x86/PCI: Add additional VMD device root ports to VMD AER quirk (bsc#1120058).
- x86/PCI: Add 'pci=big_root_window' option for AMD 64-bit windows (bsc#1120058).
- x86/PCI: Apply VMD's AERSID fixup generically (bsc#1120058).
- x86/PCI: Avoid AMD SB7xx EHCI USB wakeup defect (bsc#1120058).
- x86/PCI: Enable a 64bit BAR on AMD Family 15h (Models 00-1f, 30-3f, 60-7f) (bsc#1120058).
- x86/PCI: Enable AMD 64-bit window on resume (bsc#1120058).
- x86/PCI: Fix infinite loop in search for 64bit BAR placement (bsc#1120058).
- x86/PCI: Move and shrink AMD 64-bit window to avoid conflict (bsc#1120058).
- x86/PCI: Move VMD quirk to x86 fixups (bsc#1120058).
- x86/PCI: Only enable a 64bit BAR on single-socket AMD Family 15h (bsc#1120058).
- x86/PCI: Use is_vmd() rather than relying on the domain number (bsc#1120058).
- x86/process: Consolidate and simplify switch_to_xtra() code (bsc#1106913).
- x86/pti: Document fix wrong index (git-fixes).
- x86/retpoline: Make CONFIG_RETPOLINE depend on compiler support (bsc#1106913).
- x86/retpoline: Remove minimal retpoline support (bsc#1106913).
- x86/speculataion: Mark command line parser data __initdata (bsc#1106913).
- x86/speculation: Add command line control for indirect branch speculation (bsc#1106913).
- x86/speculation: Add prctl() control for indirect branch speculation (bsc#1106913).
- x86/speculation: Add seccomp Spectre v2 user space protection mode (bsc#1106913).
- x86/speculation: Apply IBPB more strictly to avoid cross-process data leak (bsc#1106913).
- x86/speculation: Avoid __switch_to_xtra() calls (bsc#1106913).
- x86/speculation: Clean up spectre_v2_parse_cmdline() (bsc#1106913).
- x86/speculation: Disable STIBP when enhanced IBRS is in use (bsc#1106913).
- x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation (bsc#1106913).
- x86/speculation: Enable prctl mode for spectre_v2_user (bsc#1106913).
- x86/speculation/l1tf: Drop the swap storage limit restriction when l1tf=off (bnc#1114871).
- x86/speculation: Mark string arrays const correctly (bsc#1106913).
- x86/speculation: Move STIPB/IBPB string conditionals out of cpu_show_common() (bsc#1106913).
- x86/speculation: Prepare arch_smt_update() for PRCTL mode (bsc#1106913).
- x86/speculation: Prepare for conditional IBPB in switch_mm() (bsc#1106913).
- x86/speculation: Prepare for per task indirect branch speculation control (bsc#1106913).
- x86/speculation: Prevent stale SPEC_CTRL msr content (bsc#1106913).
- x86/speculation: Propagate information about RSB filling mitigation to sysfs (bsc#1106913).
- x86/speculation: Provide IBPB always command line options (bsc#1106913).
- x86/speculation: Remove unnecessary ret variable in cpu_show_common() (bsc#1106913).
- x86/speculation: Rename SSBD update functions (bsc#1106913).
- x86/speculation: Reorder the spec_v2 code (bsc#1106913).
- x86/speculation: Reorganize speculation control MSRs update (bsc#1106913).
- x86/speculation: Rework SMT state change (bsc#1106913).
- x86/speculation: Split out TIF update (bsc#1106913).
- x86/speculation: Support Enhanced IBRS on future CPUs ().
- x86/speculation: Unify conditional spectre v2 print functions (bsc#1106913).
- x86/speculation: Update the TIF_SSBD comment (bsc#1106913).
- x86/xen: Fix boot loader version reported for PVH guests (bnc#1065600).
- xen/balloon: Support xend-based toolstack (bnc#1065600).
- xen/blkfront: avoid NULL blkfront_info dereference on device removal (bsc#1111062).
- xen: fix race in xen_qlock_wait() (bnc#1107256).
- xen: fix xen_qlock_wait() (bnc#1107256).
- xen: make xen_qlock_wait() nestable (bnc#1107256).
- xen/netfront: do not bug in case of too many frags (bnc#1104824).
- xen/netfront: tolerate frags with no data (bnc#1119804).
- xen/pvh: do not try to unplug emulated devices (bnc#1065600).
- xen/pvh: increase early stack size (bnc#1065600).
- xen-swiotlb: use actually allocated size on check physical continuous (bnc#1065600).
- xen/x86: add diagnostic printout to xen_mc_flush() in case of error (bnc#1116183).
- xfs: Align compat attrlist_by_handle with native implementation (git-fixes).
- xfs: Fix error code in 'xfs_ioc_getbmap()' (git-fixes).
- xfs: fix quotacheck dquot id overflow infinite loop (bsc#1121621).
- xfs: Fix xqmstats offsets in /proc/fs/xfs/xqmstat (git-fixes).
- xfs: Properly detect when DAX won't be used on any device (bsc#1115976).
- xfs: xfs_buf: drop useless LIST_HEAD (git-fixes).
- xhci: Add check for invalid byte size error when UAS devices are connected (bsc#1051510).
- xhci: Add quirk to workaround the errata seen on Cavium Thunder-X2 Soc (bsc#1117162).
- xhci: Do not prevent USB2 bus suspend in state check intended for USB3 only (bsc#1051510).
- xhci: Fix leaking USB3 shared_hcd at xhci removal (bsc#1051510).
- xhci: Prevent U1/U2 link pm states if exit latency is too long (bsc#1051510).
- xprtrdma: Do not defer fencing an async RPC's chunks (git-fixes).
Patchnames
SUSE-2019-224,SUSE-SLE-Module-Basesystem-15-2019-224,SUSE-SLE-Module-Development-Tools-15-2019-224,SUSE-SLE-Module-Development-Tools-OBS-15-2019-224,SUSE-SLE-Module-Legacy-15-2019-224,SUSE-SLE-Module-Live-Patching-15-2019-224,SUSE-SLE-Product-HA-15-2019-224,SUSE-SLE-Product-WE-15-2019-224
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\n\nThe SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.\n\nThis update brings following features:\n\n- Support for Enhanced-IBRS on new Intel CPUs (fate#326564)\n\nThe following security bugs were fixed:\n\n- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bnc#1118319).\n- CVE-2018-12232: In net/socket.c there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat did not increment the file descriptor reference count, which allowed close to set the socket to NULL during fchownat's execution, leading to a NULL pointer dereference and system crash (bnc#1097593).\n- CVE-2018-14625: A flaw was found where an attacker may be able to have an uncontrolled read to kernel-memory from within a vm guest. A race condition between connect() and close() function may allow an attacker using the AF_VSOCK protocol to gather a 4 byte information leak or possibly intercept or corrupt AF_VSOCK messages destined to other clients (bnc#1106615).\n- CVE-2018-16862: A security flaw was found in the way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one (bnc#1117186).\n- CVE-2018-16884: NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bnc#1119946).\n- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).\n- CVE-2018-18397: The userfaultfd implementation mishandled access control for certain UFFDIO_ ioctl calls, as demonstrated by allowing local users to write data into holes in a tmpfs file (if the user has read-only access to that file, and that file contains holes), related to fs/userfaultfd.c and mm/userfaultfd.c (bnc#1117656).\n- CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).\n- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized (bnc#1116841).\n- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).\n- CVE-2018-19854: An issue was discovered in the crypto_report_one() and related functions in crypto/crypto_user.c (the crypto user configuration API) do not fully initialize structures that are copied to userspace, potentially leaking sensitive memory to user programs. NOTE: this is a CVE-2013-2547 regression but with easier exploitability because the attacker did not need a capability (however, the system must have the CONFIG_CRYPTO_USER kconfig option) (bnc#1118428).\n- CVE-2018-19985: The function hso_probe read if_num from the USB device (as an u8) and used it without a length check to index an array, resulting in an OOB memory read in hso_probe or hso_get_config_data that could be used by local attackers (bnc#1120743).\n- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).\n\nThe following non-security bugs were fixed:\n\n- acpi/apei: Handle GSIV and GPIO notification types (bsc#1115567).\n- acpica: Tables: Add WSMT support (bsc#1089350).\n- acpi/cpcc: Check for valid PCC subspace only if PCC is used (bsc#1117115).\n- acpi/cpcc: Update all pr_(debug/err) messages to log the susbspace id (bsc#1117115).\n- acpi/iort: Fix iort_get_platform_device_domain() uninitialized pointer value (bsc#1051510).\n- acpi/LPSS: Add alternative ACPI HIDs for Cherry Trail DMA controllers (bsc#1051510).\n- acpi/nfit: Fix ARS overflow continuation (bsc#1116895).\n- acpi/nfit, x86/mce: Handle only uncorrectable machine checks (bsc#1114279).\n- acpi/nfit, x86/mce: Validate a MCE's address before using it (bsc#1114279).\n- acpi/platform: Add SMB0001 HID to forbidden_id_list (bsc#1051510).\n- acpi/watchdog: Prefer iTCO_wdt always when WDAT table uses RTC SRAM (bsc#1051510).\n- act_ife: fix a potential use-after-free (networking-stable-18_09_11).\n- aio: fix spectre gadget in lookup_ioctx (bsc#1120594).\n- alsa: ac97: Fix incorrect bit shift at AC97-SPSA control write (bsc#1051510).\n- alsa: ca0106: Disable IZD on SB0570 DAC to fix audio pops (bsc#1051510).\n- alsa: control: Fix race between adding and removing a user element (bsc#1051510).\n- alsa: cs46xx: Potential NULL dereference in probe (bsc#1051510).\n- alsa: emu10k1: Fix potential Spectre v1 vulnerabilities (bsc#1051510).\n- alsa: emux: Fix potential Spectre v1 vulnerabilities (bsc#1051510).\n- alsa: fireface: fix for state to fetch PCM frames (bsc#1051510).\n- alsa: fireface: fix reference to wrong register for clock configuration (bsc#1051510).\n- alsa: firewire-lib: fix wrong assignment for 'out_packet_without_header' tracepoint (bsc#1051510).\n- alsa: firewire-lib: fix wrong handling payload_length as payload_quadlet (bsc#1051510).\n- alsa: firewire-lib: use the same print format for 'without_header' tracepoints (bsc#1051510).\n- alsa: hda: Add 2 more models to the power_save blacklist (bsc#1051510).\n- alsa: hda: Add ASRock N68C-S UCC the power_save blacklist (bsc#1051510).\n- alsa: hda - Add mic quirk for the Lenovo G50-30 (17aa:3905) (bsc#1051510).\n- alsa: hda: add mute LED support for HP EliteBook 840 G4 (bsc#1051510).\n- alsa: hda - Add quirk for ASUS G751 laptop (bsc#1051510).\n- alsa: hda: Add support for AMD Stoney Ridge (bsc#1051510).\n- alsa: hda/ca0132 - Call pci_iounmap() instead of iounmap() (bsc#1051510).\n- alsa: hda/ca0132 - make pci_iounmap() call conditional (bsc#1051510).\n- alsa: hda: fix front speakers on Huawei MBXP (bsc#1051510).\n- alsa: hda - Fix headphone pin config for ASUS G751 (bsc#1051510).\n- alsa: hda: fix unused variable warning (bsc#1051510).\n- alsa: hda/realtek - Add auto-mute quirk for HP Spectre x360 laptop (bsc#1051510).\n- alsa: hda/realtek - Add GPIO data update helper (bsc#1051510).\n- alsa: hda/realtek - Add support for Acer Aspire C24-860 headset mic (bsc#1051510).\n- alsa: hda/realtek - Add unplug function into unplug state of Headset Mode for ALC225 (bsc#1051510).\n- alsa: hda/realtek: ALC286 mic and headset-mode fixups for Acer Aspire U27-880 (bsc#1051510).\n- alsa: hda/realtek: ALC294 mic and headset-mode fixups for ASUS X542UN (bsc#1051510).\n- alsa: hda/realtek - Allow skipping spec->init_amp detection (bsc#1051510).\n- alsa: hda/realtek - Disable headset Mic VREF for headset mode of ALC225 (bsc#1051510).\n- alsa: hda/realtek: Enable audio jacks of ASUS UX391UA with ALC294 (bsc#1051510).\n- alsa: hda/realtek: Enable audio jacks of ASUS UX433FN/UX333FA with ALC294 (bsc#1051510).\n- alsa: hda/realtek: Enable audio jacks of ASUS UX533FD with ALC294 (bsc#1051510).\n- alsa: hda/realtek: Enable the headset mic auto detection for ASUS laptops (bsc#1051510).\n- alsa: hda/realtek - Fixed headphone issue for ALC700 (bsc#1051510).\n- alsa: hda/realtek - fix headset mic detection for MSI MS-B171 (bsc#1051510).\n- alsa: hda/realtek - Fix HP Headset Mic can't record (bsc#1051510).\n- alsa: hda/realtek: Fix mic issue on Acer AIO Veriton Z4660G (bsc#1051510).\n- alsa: hda/realtek: Fix mic issue on Acer AIO Veriton Z4860G/Z6860G (bsc#1051510).\n- alsa: hda/realtek - Fix speaker output regression on Thinkpad T570 (bsc#1051510).\n- alsa: hda/realtek - Fix the mute LED regresion on Lenovo X1 Carbon (bsc#1051510).\n- alsa: hda/realtek - fix the pop noise on headphone for lenovo laptops (bsc#1051510).\n- alsa: hda/realtek - Fix the problem of the front MIC on the Lenovo M715 (bsc#1051510).\n- alsa: hda/realtek - Manage GPIO bits commonly (bsc#1051510).\n- alsa: hda/realtek - Simplify Dell XPS13 GPIO handling (bsc#1051510).\n- alsa: hda/realtek - Support ALC300 (bsc#1051510).\n- alsa: hda/realtek - Support Dell headset mode for New AIO platform (bsc#1051510).\n- alsa: hda/tegra: clear pending irq handlers (bsc#1051510).\n- alsa: oss: Use kvzalloc() for local buffer allocations (bsc#1051510).\n- alsa: pcm: Call snd_pcm_unlink() conditionally at closing (bsc#1051510).\n- alsa: pcm: Fix interval evaluation with openmin/max (bsc#1051510).\n- alsa: pcm: Fix potential Spectre v1 vulnerability (bsc#1051510).\n- alsa: pcm: Fix starvation on down_write_nonblock() (bsc#1051510).\n- alsa: rme9652: Fix potential Spectre v1 vulnerability (bsc#1051510).\n- alsa: sparc: Fix invalid snd_free_pages() at error path (bsc#1051510).\n- alsa: trident: Suppress gcc string warning (bsc#1051510).\n- alsa: usb-audio: Add SMSL D1 to quirks for native DSD support (bsc#1051510).\n- alsa: usb-audio: Add support for Encore mDSD USB DAC (bsc#1051510).\n- alsa: usb-audio: Add vendor and product name for Dell WD19 Dock (bsc#1051510).\n- alsa: usb-audio: Avoid access before bLength check in build_audio_procunit() (bsc#1051510).\n- alsa: usb-audio: Fix an out-of-bound read in create_composite_quirks (bsc#1051510).\n- alsa: usb-audio: update quirk for B&W PX to remove microphone (bsc#1051510).\n- alsa: wss: Fix invalid snd_free_pages() at error path (bsc#1051510).\n- alsa: x86: Fix runtime PM for hdmi-lpe-audio (bsc#1051510).\n- amd/iommu: Fix Guest Virtual APIC Log Tail Address Register (bsc#1106105).\n- apparmor: do not try to replace stale label in ptrace access check (git-fixes).\n- apparmor: do not try to replace stale label in ptraceme check (git-fixes).\n- apparmor: Fix uninitialized value in aa_split_fqname (git-fixes).\n- arm64: Add work around for Arm Cortex-A55 Erratum 1024718 (bsc#1120612).\n- arm64: atomics: Remove '&' from '+&' asm constraint in lse atomics (bsc#1120613).\n- arm64: cpu_errata: include required headers (bsc#1120615).\n- arm64: dma-mapping: Fix FORCE_CONTIGUOUS buffer clearing (bsc#1120633).\n- arm64: Enabled ENA (Amazon network driver) for arm64.\n- arm64: Fix /proc/iomem for reserved but not memory regions (bsc#1120632).\n- arm64: kvm: Move CPU ID reg trap setup off the world switch path (bsc#1110998).\n- arm64: kvm: Sanitize PSTATE.M when being set from userspace (bsc#1110998).\n- arm64: kvm: Tighten guest core register access from userspace (bsc#1110998).\n- arm64: lse: Add early clobbers to some input/output asm operands (bsc#1120614).\n- arm64: lse: remove -fcall-used-x0 flag (bsc#1120618).\n- arm64: mm: always enable CONFIG_HOLES_IN_ZONE (bsc#1120617).\n- arm64/numa: Report correct memblock range for the dummy node (bsc#1120620).\n- arm64/numa: Unify common error path in numa_init() (bsc#1120621).\n- arm64: remove no-op -p linker flag (bsc#1120616).\n- arm: dts: at91: add new compatibility string for macb on sama5d3 (bsc#1051510).\n- ASoC: dapm: Recalculate audio map forcely when card instantiated (bsc#1051510).\n- ASoC: dwc: Added a quirk DW_I2S_QUIRK_16BIT_IDX_OVERRIDE to dwc (bsc#1085535)\n- ASoC: Intel: cht_bsw_max98090: add support for Baytrail (bsc#1051510).\n- ASoC: intel: cht_bsw_max98090_ti: Add pmc_plt_clk_0 quirk for Chromebook Clapper (bsc#1051510).\n- ASoC: intel: cht_bsw_max98090_ti: Add pmc_plt_clk_0 quirk for Chromebook Gnawty (bsc#1051510).\n- ASoC: intel: cht_bsw_max98090_ti: Add quirk for boards using pmc_plt_clk_0 (bsc#1051510).\n- ASoC: Intel: mrfld: fix uninitialized variable access (bsc#1051510).\n- ASoC: intel: skylake: Add missing break in skl_tplg_get_token() (bsc#1051510).\n- ASoC: omap-abe-twl6040: Fix missing audio card caused by deferred probing (bsc#1051510).\n- ASoC: omap-dmic: Add pm_qos handling to avoid overruns with CPU_IDLE (bsc#1051510).\n- ASoC: omap-mcbsp: Fix latency value calculation for pm_qos (bsc#1051510).\n- ASoC: omap-mcpdm: Add pm_qos handling to avoid under/overruns with CPU_IDLE (bsc#1051510).\n- ASoC: rsnd: fixup clock start checker (bsc#1051510).\n- ASoC: sun8i-codec: fix crash on module removal (bsc#1051510).\n- ASoC: wm_adsp: Fix dma-unsafe read of scratch registers (bsc#1051510).\n- ata: Fix racy link clearance (bsc#1107866).\n- ataflop: fix error handling during setup (bsc#1051510).\n- ath10k: do not assume this is a PCI dev in generic code (bsc#1051510).\n- ath10k: schedule hardware restart if WMI command times out (bsc#1051510).\n- ath6kl: Only use match sets when firmware supports it (bsc#1051510).\n- autofs: fix autofs_sbi() does not check super block type (git-fixes).\n- autofs: fix slab out of bounds read in getname_kernel() (git-fixes).\n- autofs: mount point create should honour passed in mode (git-fixes).\n- b43: Fix error in cordic routine (bsc#1051510).\n- badblocks: fix wrong return value in badblocks_set if badblocks are disabled (git-fixes).\n- batman-adv: Expand merged fragment buffer for full packet (bsc#1051510).\n- batman-adv: Use explicit tvlv padding for ELP packets (bsc#1051510).\n- bcache: fix miss key refill->end in writeback (Git-fixes).\n- bcache: trace missed reading by cache_missed (Git-fixes).\n- bitops: protect variables in bit_clear_unless() macro (bsc#1051510).\n- bitops: protect variables in set_mask_bits() macro (bsc#1051510).\n- blk-mq: remove synchronize_rcu() from blk_mq_del_queue_tag_set() (Git-fixes).\n- block: allow max_discard_segments to be stacked (Git-fixes).\n- block: blk_init_allocated_queue() set q->fq as NULL in the fail case (Git-fixes).\n- block: copy ioprio in __bio_clone_fast() (bsc#1082653).\n- block: really disable runtime-pm for blk-mq (Git-fixes).\n- block: reset bi_iter.bi_done after splitting bio (Git-fixes).\n- block: respect virtual boundary mask in bvecs (bsc#1113412).\n- block/swim: Fix array bounds check (Git-fixes).\n- bluetooth: btbcm: Add entry for BCM4335C0 UART bluetooth (bsc#1051510).\n- bluetooth: SMP: fix crash in unpairing (bsc#1051510).\n- bnxt_en: do not try to offload VLAN 'modify' action (bsc#1050242 ).\n- bnxt_en: Fix enables field in HWRM_QUEUE_COS2BW_CFG request (bsc#1086282).\n- bnxt_en: Fix TX timeout during netpoll (networking-stable-18_10_16).\n- bnxt_en: Fix VNIC reservations on the PF (bsc#1086282 ).\n- bnxt_en: free hwrm resources, if driver probe fails (networking-stable-18_10_16).\n- bnxt_en: get the reduced max_irqs by the ones used by RDMA (bsc#1050242).\n- bonding: avoid possible dead-lock (networking-stable-18_10_16).\n- bonding: fix length of actor system (networking-stable-18_11_02).\n- bonding: fix warning message (networking-stable-18_10_16).\n- bonding: pass link-local packets to bonding master also (networking-stable-18_10_16).\n- bpf: fix check of allowed specifiers in bpf_trace_printk (bsc#1083647).\n- bpf: fix partial copy of map_ptr when dst is scalar (bsc#1083647).\n- bpf, net: add skb_mac_header_len helper (networking-stable-18_09_24).\n- bpf: use per htab salt for bucket hash (git-fixes).\n- bpf: wait for running BPF programs when updating map-in-map (bsc#1083647).\n- brcmfmac: fix for proper support of 160MHz bandwidth (bsc#1051510).\n- brcmfmac: fix reporting support for 160 MHz channels (bsc#1051510).\n- brcmutil: really fix decoding channel info for 160 MHz bandwidth (bsc#1051510).\n- bridge: do not add port to router list when receives query with source 0.0.0.0 (networking-stable-18_11_02).\n- btrfs: Always try all copies when reading extent buffers (git-fixes).\n- btrfs: delete dead code in btrfs_orphan_add() (bsc#1111469).\n- btrfs: delete dead code in btrfs_orphan_commit_root() (bsc#1111469).\n- btrfs: do not BUG_ON() in btrfs_truncate_inode_items() (bsc#1111469).\n- btrfs: do not check inode's runtime flags under root->orphan_lock (bsc#1111469).\n- btrfs: do not return ino to ino cache if inode item removal fails (bsc#1111469).\n- btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667).\n- btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).\n- btrfs: fix assertion failure during fsync in no-holes mode (bsc#1118136).\n- btrfs: fix assertion on fsync of regular file when using no-holes feature (bsc#1118137).\n- btrfs: fix cur_offset in the error case for nocow (bsc#1118140).\n- btrfs: fix data corruption due to cloning of eof block (bsc#1116878).\n- btrfs: fix deadlock on tree root leaf when finding free extent (bsc#1116876).\n- btrfs: fix deadlock when writing out free space caches (bsc#1116700).\n- btrfs: fix ENOSPC caused by orphan items reservations (bsc#1111469).\n- btrfs: Fix error handling in btrfs_cleanup_ordered_extents (git-fixes).\n- btrfs: fix error handling in btrfs_truncate() (bsc#1111469).\n- btrfs: fix error handling in btrfs_truncate_inode_items() (bsc#1111469).\n- btrfs: fix fsync of files with multiple hard links in new directories (1120173).\n- btrfs: fix infinite loop on inode eviction after deduplication of eof block (bsc#1116877).\n- btrfs: Fix memory barriers usage with device stats counters (git-fixes).\n- btrfs: fix null pointer dereference on compressed write path error (bsc#1116698).\n- btrfs: fix use-after-free during inode eviction (bsc#1116701).\n- btrfs: fix use-after-free on root->orphan_block_rsv (bsc#1111469).\n- btrfs: fix use-after-free when dumping free space (bsc#1116862).\n- btrfs: fix warning when replaying log after fsync of a tmpfile (bsc#1116692).\n- btrfs: fix wrong dentries after fsync of file that got its parent replaced (bsc#1116693).\n- btrfs: get rid of BTRFS_INODE_HAS_ORPHAN_ITEM (bsc#1111469).\n- btrfs: get rid of unused orphan infrastructure (bsc#1111469).\n- btrfs: make sure we create all new block groups (bsc#1116699).\n- btrfs: move btrfs_truncate_block out of trans handle (bsc#1111469).\n- btrfs: protect space cache inode alloc with GFP_NOFS (bsc#1116863).\n- btrfs: qgroup: Dirty all qgroups before rescan (bsc#1120036).\n- btrfs: refactor btrfs_evict_inode() reserve refill dance (bsc#1111469).\n- btrfs: renumber BTRFS_INODE_ runtime flags and switch to enums (bsc#1111469).\n- btrfs: reserve space for O_TMPFILE orphan item deletion (bsc#1111469).\n- btrfs: run delayed items before dropping the snapshot (bsc#1121263, bsc#1111188).\n- btrfs: send, fix infinite loop due to directory rename dependencies (bsc#1118138).\n- btrfs: stop creating orphan items for truncate (bsc#1111469).\n- btrfs: tree-checker: Do not check max block group size as current max chunk size limit is unreliable (fixes for bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875).\n- btrfs: update stale comments referencing vmtruncate() (bsc#1111469).\n- cachefiles: fix the race between cachefiles_bury_object() and rmdir(2) (bsc#1051510).\n- can: dev: __can_get_echo_skb(): Do not crash the kernel if can_priv::echo_skb is accessed out of bounds (bsc#1051510).\n- can: dev: can_get_echo_skb(): factor out non sending code to __can_get_echo_skb() (bsc#1051510).\n- can: dev: __can_get_echo_skb(): print error message, if trying to echo non existing skb (bsc#1051510).\n- can: dev: __can_get_echo_skb(): replace struct can_frame by canfd_frame to access frame length (bsc#1051510).\n- can: flexcan: flexcan_irq(): fix indention (bsc#1051510).\n- can: hi311x: Use level-triggered interrupt (bsc#1051510).\n- can: raw: check for CAN FD capable netdev in raw_sendmsg() (bsc#1051510).\n- can: rcar_can: Fix erroneous registration (bsc#1051510).\n- can: rx-offload: introduce can_rx_offload_get_echo_skb() and can_rx_offload_queue_sorted() functions (bsc#1051510).\n- cdc-acm: correct counting of UART states in serial state notification (bsc#1051510).\n- cdc-acm: do not reset notification buffer index upon urb unlinking (bsc#1051510).\n- cdrom: do not attempt to fiddle with cdo->capability (bsc#1051510).\n- ceph: do not update importing cap's mseq when handing cap export (bsc#1121273).\n- ceph: fix dentry leak in ceph_readdir_prepopulate (bsc#1114839).\n- ceph: quota: fix null pointer dereference in quota check (bsc#1114839).\n- cfg80211: Address some corner cases in scan result channel updating (bsc#1051510).\n- cfg80211: fix use-after-free in reg_process_hint() (bsc#1051510).\n- char_dev: extend dynamic allocation of majors into a higher range (bsc#1121058).\n- char_dev: Fix off-by-one bugs in find_dynamic_major() (bsc#1121058).\n- clk: at91: Fix division by zero in PLL recalc_rate() (bsc#1051510).\n- clk: fixed-factor: fix of_node_get-put imbalance (bsc#1051510).\n- clk: fixed-rate: fix of_node_get-put imbalance (bsc#1051510).\n- clk: mmp2: fix the clock id for sdh2_clk and sdh3_clk (bsc#1051510).\n- clk: mmp: Off by one in mmp_clk_add() (bsc#1051510).\n- clk: mvebu: Off by one bugs in cp110_of_clk_get() (bsc#1051510).\n- clk: rockchip: Fix static checker warning in rockchip_ddrclk_get_parent call (bsc#1051510).\n- clk: s2mps11: Add used attribute to s2mps11_dt_match (bsc#1051510).\n- clk: s2mps11: Fix matching when built as module and DT node contains compatible (bsc#1051510).\n- clk: samsung: exynos5420: Enable PERIS clocks for suspend (bsc#1051510).\n- clockevents/drivers/i8253: Add support for PIT shutdown quirk (bsc#1051510).\n- compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations (git-fixes).\n- config: arm64: enable erratum 1024718\n- configfs: replace strncpy with memcpy (bsc#1051510).\n- cpufeature: avoid warning when compiling with clang (Git-fixes).\n- cpufreq / CPPC: Add cpuinfo_cur_freq support for CPPC (bsc#1117115).\n- cpufreq: CPPC: fix build in absence of v3 support (bsc#1117115).\n- cpupower: remove stringop-truncation waring (git-fixes).\n- crypto: bcm - fix normal/non key hash algorithm failure (bsc#1051510).\n- crypto: caam - fix implicit casts in endianness helpers (bsc#1051510).\n- crypto: ccp - Add DOWNLOAD_FIRMWARE SEV command ().\n- crypto: ccp - Add GET_ID SEV command ().\n- crypto: ccp - Add psp enabled message when initialization succeeds ().\n- crypto: ccp - Add support for new CCP/PSP device ID ().\n- crypto: ccp - Allow SEV firmware to be chosen based on Family and Model ().\n- crypto: ccp - Fix static checker warning ().\n- crypto: ccp - Remove unused #defines ().\n- crypto: ccp - Support register differences between PSP devices ().\n- crypto: lrw - Fix out-of bounds access on counter overflow (bsc#1051510).\n- crypto: simd - correctly take reqsize of wrapped skcipher into account (bsc#1051510).\n- crypto: tcrypt - fix ghash-generic speed test (bsc#1051510).\n- dasd: fix deadlock in dasd_times_out (bsc#1121477, LTC#174111).\n- dax: Check page->mapping isn't NULL (bsc#1120054).\n- dax: Do not access a freed inode (bsc#1120055).\n- device property: Define type of PROPERTY_ENRTY_*() macros (bsc#1051510).\n- device property: fix fwnode_graph_get_next_endpoint() documentation (bsc#1051510).\n- disable stringop truncation warnings for now (git-fixes).\n- dm: allocate struct mapped_device with kvzalloc (Git-fixes).\n- dm cache: destroy migration_cache if cache target registration failed (Git-fixes).\n- dm cache: fix resize crash if user does not reload cache table (Git-fixes).\n- dm cache metadata: ignore hints array being too small during resize (Git-fixes).\n- dm cache metadata: save in-core policy_hint_size to on-disk superblock (Git-fixes).\n- dm cache metadata: set dirty on all cache blocks after a crash (Git-fixes).\n- dm cache: only allow a single io_mode cache feature to be requested (Git-fixes).\n- dm crypt: do not decrease device limits (Git-fixes).\n- dm: fix report zone remapping to account for partition offset (Git-fixes).\n- dm integrity: change 'suspending' variable from bool to int (Git-fixes).\n- dm ioctl: harden copy_params()'s copy_from_user() from malicious users (Git-fixes).\n- dm linear: eliminate linear_end_io call if CONFIG_DM_ZONED disabled (Git-fixes).\n- dm linear: fix linear_end_io conditional definition (Git-fixes).\n- dm thin: handle running out of data space vs concurrent discard (Git-fixes).\n- dm thin metadata: remove needless work from __commit_transaction (Git-fixes).\n- dm thin: stop no_space_timeout worker when switching to write-mode (Git-fixes).\n- dm writecache: fix a crash due to reading past end of dirty_bitmap (Git-fixes).\n- dm writecache: report start_sector in status line (Git-fixes).\n- dm zoned: fix metadata block ref counting (Git-fixes).\n- dm zoned: fix various dmz_get_mblock() issues (Git-fixes).\n- doc/README.SUSE: correct GIT url No more gitorious, github we use.\n- Documentation/l1tf: Fix small spelling typo (bsc#1051510).\n- Documentation/l1tf: Fix typos (bsc#1051510).\n- Documentation/l1tf: Remove Yonah processors from not vulnerable list (bsc#1051510).\n- do d_instantiate/unlock_new_inode combinations safely (git-fixes).\n- driver/dma/ioat: Call del_timer_sync() without holding prep_lock (bsc#1051510).\n- drivers/net/usb: add device id for TP-LINK UE300 USB 3.0 Ethernet (bsc#1119749).\n- drivers/net/usb/r8152: remove the unneeded variable 'ret' in rtl8152_system_suspend (bsc#1119749).\n- drivers/tty: add missing of_node_put() (bsc#1051510).\n- drm/amdgpu: add missing CHIP_HAINAN in amdgpu_ucode_get_load_type (bsc#1051510).\n- drm/amdgpu/gmc8: update MC firmware for polaris (bsc#1113722)\n- drm/amdgpu/powerplay: fix missing break in switch statements (bsc#1113722)\n- drm/amdgpu: update mc firmware image for polaris12 variants (bsc#1113722)\n- drm/amdgpu: update SMC firmware image for polaris10 variants (bsc#1113722)\n- drm/ast: change resolution may cause screen blurred (boo#1112963).\n- drm/ast: fixed cursor may disappear sometimes (bsc#1051510).\n- drm/ast: Fix incorrect free on ioregs (bsc#1051510).\n- drm/ast: Remove existing framebuffers before loading driver (boo#1112963)\n- drm/dp_mst: Check if primary mstb is null (bsc#1051510).\n- drm/dp_mst: Skip validating ports during destruction, just ref (bsc#1051510).\n- drm/edid: Add 6 bpc quirk for BOE panel (bsc#1051510).\n- drm/edid: Add 6 bpc quirk for BOE panel in HP Pavilion 15-n233sl (bsc#1113722)\n- drm/fb-helper: Ignore the value of fb_var_screeninfo.pixclock (bsc#1113722)\n- drm: fb-helper: Reject all pixel format changing requests (bsc#1113722)\n- drm/hisilicon: hibmc: Do not carry error code in HiBMC framebuffer (bsc#1113722)\n- drm/hisilicon: hibmc: Do not overwrite fb helper surface depth (bsc#1113722)\n- drm/i915/audio: Hook up component bindings even if displays are (bsc#1113722)\n- drm/i915: Do not oops during modeset shutdown after lpe audio deinit (bsc#1051510).\n- drm/i915: Do not unset intel_connector->mst_port (bsc#1051510).\n- drm/i915/dp: Link train Fallback on eDP only if fallback link BW can fit panel's native mode (bsc#1051510).\n- drm/i915/execlists: Apply a full mb before execution for Braswell (bsc#1113722)\n- drm/i915/execlists: Force write serialisation into context image vs execution (bsc#1051510).\n- drm/i915: Fix ilk+ watermarks when disabling pipes (bsc#1051510).\n- drm/i915/gen9+: Fix initial readout for Y tiled framebuffers (bsc#1113722)\n- drm/i915/glk: Remove 99% limitation (bsc#1051510).\n- drm/i915/hdmi: Add HDMI 2.0 audio clock recovery N values (bsc#1051510).\n- drm/i915: Large page offsets for pread/pwrite (bsc#1051510).\n- drm/i915: Mark pin flags as u64 (bsc#1051510).\n- drm/i915: Restore vblank interrupts earlier (bsc#1051510).\n- drm/i915: Skip vcpi allocation for MSTB ports that are gone (bsc#1051510).\n- drm/i915: Write GPU relocs harder with gen3 (bsc#1051510).\n- drm/ioctl: Fix Spectre v1 vulnerabilities (bsc#1113722)\n- drm/mediatek: fix OF sibling-node lookup (bsc#1106110)\n- drm/meson: add support for 1080p25 mode (bsc#1051510).\n- drm/meson: Enable fast_io in meson_dw_hdmi_regmap_config (bsc#1051510).\n- drm/meson: Fix OOB memory accesses in meson_viu_set_osd_lut() (bsc#1051510).\n- drm/msm: fix OF child-node lookup (bsc#1106110)\n- drm/nouveau: Check backlight IDs are >= 0, not > 0 (bsc#1051510).\n- drm/nouveau: Do not disable polling in fallback mode (bsc#1103356).\n- drm/nouveau/kms: Fix memory leak in nv50_mstm_del() (bsc#1113722)\n- drm/omap: fix memory barrier bug in DMM driver (bsc#1051510).\n- drm: rcar-du: Fix external clock error checks (bsc#1113722)\n- drm: rcar-du: Fix vblank initialization (bsc#1113722)\n- drm/rockchip: Allow driver to be shutdown on reboot/kexec (bsc#1051510).\n- drm/rockchip: psr: do not dereference encoder before it is null (bsc#1113722)\n- drm: set is_master to 0 upon drm_new_set_master() failure (bsc#1113722)\n- drm/sti: do not remove the drm_bridge that was never added (bsc#1100132)\n- drm/vc4: Set ->is_yuv to false when num_planes == 1 (bsc#1113722)\n- drm/vc4: ->x_scaling[1] should never be set to VC4_SCALING_NONE (bsc#1113722)\n- drm/virtio: fix bounds check in virtio_gpu_cmd_get_capset() (bsc#1113722)\n- dt-bindings: add compatible string for Allwinner V3s SoC (git-fixes).\n- dt-bindings: arm: Document SoC compatible value for Armadillo-800 EVA (git-fixes).\n- dt-bindings: clock: add rk3399 DDR3 standard speed bins (git-fixes).\n- dt-bindings: clock: mediatek: add binding for fixed-factor clock axisel_d4 (git-fixes).\n- dt-bindings: iio: update STM32 timers clock names (git-fixes).\n- dt-bindings: mfd: axp20x: Add AXP806 to supported list of chips (git-fixes).\n- dt-bindings: net: Remove duplicate NSP Ethernet MAC binding document (git-fixes).\n- dt-bindings: panel: lvds: Fix path to display timing bindings (git-fixes).\n- dt-bindings: phy: sun4i-usb-phy: Add property descriptions for H3 (git-fixes).\n- dt-bindings: pwm: renesas: tpu: Fix 'compatible' prop description (git-fixes).\n- dt-bindings: rcar-dmac: Document missing error interrupt (git-fixes).\n- EDAC, {i7core,sb,skx}_edac: Fix uncorrected error counting (bsc#1114279).\n- EDAC: Raise the maximum number of memory controllers (bsc#1113780).\n- EDAC, skx_edac: Fix logical channel intermediate decoding (bsc#1114279).\n- EDAC, thunderx: Fix memory leak in thunderx_l2c_threaded_isr() (bsc#1114279).\n- efi: Move some sysfs files to be read-only by root (bsc#1051510).\n- ethernet: fman: fix wrong of_node_put() in probe function (bsc#1119017).\n- exportfs: fix 'passing zero to ERR_PTR()' warning (bsc#1118773).\n- ext2: fix potential use after free (bsc#1118775).\n- ext4: add missing brelse() add_new_gdb_meta_bg()'s error path (bsc#1117795).\n- ext4: add missing brelse() in set_flexbg_block_bitmap()'s error path (bsc#1117794).\n- ext4: add missing brelse() update_backups()'s error path (bsc#1117796).\n- ext4: avoid buffer leak in ext4_orphan_add() after prior errors (bsc#1117802).\n- ext4: avoid buffer leak on shutdown in ext4_mark_iloc_dirty() (bsc#1117801).\n- ext4: avoid possible double brelse() in add_new_gdb() on error path (bsc#1118760).\n- ext4: avoid potential extra brelse in setup_new_flex_group_blocks() (bsc#1117792).\n- ext4: fix buffer leak in __ext4_read_dirblock() on error path (bsc#1117807).\n- ext4: fix buffer leak in ext4_xattr_move_to_block() on error path (bsc#1117806).\n- ext4: fix EXT4_IOC_GROUP_ADD ioctl (bsc#1120604).\n- ext4: fix missing cleanup if ext4_alloc_flex_bg_array() fails while resizing (bsc#1117798).\n- ext4: fix possible inode leak in the retry loop of ext4_resize_fs() (bsc#1117799).\n- ext4: fix possible leak of sbi->s_group_desc_leak in error path (bsc#1117803).\n- ext4: fix possible leak of s_journal_flag_rwsem in error path (bsc#1117804).\n- ext4: fix possible use after free in ext4_quota_enable (bsc#1120602).\n- ext4: fix setattr project check in fssetxattr ioctl (bsc#1117789).\n- ext4: fix use-after-free race in ext4_remount()'s error path (bsc#1117791).\n- ext4: initialize retries variable in ext4_da_write_inline_data_begin() (bsc#1117788).\n- ext4: missing unlock/put_page() in ext4_try_to_write_inline_data() (bsc#1120603).\n- ext4: propagate error from dquot_initialize() in EXT4_IOC_FSSETXATTR (bsc#1117790).\n- ext4: release bs.bh before re-using in ext4_xattr_block_find() (bsc#1117805).\n- extable: Consolidate *kernel_text_address() functions (bsc#1120092).\n- extable: Enable RCU if it is not watching in kernel_text_address() (bsc#1120092).\n- fbdev: fbcon: Fix unregister crash when more than one framebuffer (bsc#1113722)\n- fbdev: fbmem: behave better with small rotated displays and many CPUs (bsc#1113722)\n- fbdev: fix broken menu dependencies (bsc#1113722)\n- firmware: add firmware_request_nowarn() - load firmware without warnings ().\n- firmware: dcdbas: Add support for WSMT ACPI table (bsc#1089350 ).\n- firmware: dcdbas: include linux/io.h (bsc#1089350).\n- Fix the breakage of KMP build on x86_64 (bsc#1121017).\n- Fix tracing sample code warning (git-fixes).\n- floppy: fix race condition in __floppy_read_block_0() (bsc#1051510).\n- flow_dissector: do not dissect l4 ports for fragments (networking-stable-18_11_21).\n- fscache: fix race between enablement and dropping of object (bsc#1107385).\n- fscache: Fix race in fscache_op_complete() due to split atomic_sub & read (Git-fixes).\n- fscache: Pass the correct cancelled indications to fscache_op_complete() (Git-fixes).\n- fs: dcache: Avoid livelock between d_alloc_parallel and __d_add (git-fixes).\n- fs/dcache.c: fix kmemcheck splat at take_dentry_name_snapshot() (git-fixes).\n- fs: dcache: Use READ_ONCE when accessing i_dir_seq (git-fixes).\n- fs: Do not leak MNT_INTERNAL away from internal mounts (git-fixes).\n- fs: fix lost error code in dio_complete (bsc#1118762).\n- fs: Make extension of struct super_block transparent (bsc#1117822).\n- fsnotify: Fix busy inodes during unmount (bsc#1117822).\n- fsnotify: fix ignore mask logic in fsnotify() (bsc#1115074).\n- fs/xfs: Use %pS printk format for direct addresses (git-fixes).\n- ftrace: Fix debug preempt config name in stack_tracer_{en,dis}able (bsc#1117172).\n- ftrace: Fix kmemleak in unregister_ftrace_graph (bsc#1117181).\n- ftrace: Fix memleak when unregistering dynamic ops when tracing disabled (bsc#1117174).\n- ftrace: Remove incorrect setting of glob search field (bsc#1117184).\n- fuse: fix blocked_waitq wakeup (git-fixes).\n- fuse: fix leaked notify reply (git-fixes).\n- fuse: fix possibly missed wake-up after abort (git-fixes).\n- fuse: Fix use-after-free in fuse_dev_do_read() (git-fixes).\n- fuse: Fix use-after-free in fuse_dev_do_write() (git-fixes).\n- fuse: fix use-after-free in fuse_direct_IO() (git-fixes).\n- fuse: set FR_SENT while locked (git-fixes).\n- gcc-plugins: Add include required by GCC release 8 (git-fixes).\n- gcc-plugins: Use dynamic initializers (git-fixes).\n- genirq: Fix race on spurious interrupt detection (bsc#1051510).\n- getname_kernel() needs to make sure that ->name != ->iname in long case (git-fixes).\n- gfs2: Do not leave s_fs_info pointing to freed memory in init_sbd (bsc#1118769).\n- gfs2: Fix loop in gfs2_rbm_find (bsc#1120601).\n- gfs2: Get rid of potential double-freeing in gfs2_create_inode (bsc#1120600).\n- gfs2_meta: ->mount() can get NULL dev_name (bsc#1118768).\n- gfs2: Put bitmap buffers in put_super (bsc#1118772).\n- git_sort.py: Remove non-existent remote tj/libata\n- gpio: davinci: Remove unused member of davinci_gpio_controller (git-fixes).\n- gpio: do not free unallocated ida on gpiochip_add_data_with_key() error path (bsc#1051510).\n- gpiolib-acpi: Only defer request_irq for GpioInt ACPI event handlers (bsc#1051510).\n- gpiolib: Fix return value of gpio_to_desc() stub if !GPIOLIB (bsc#1051510).\n- gpio: max7301: fix driver for use with CONFIG_VMAP_STACK (bsc#1051510).\n- gpio: mvebu: only fail on missing clk if pwm is actually to be used (bsc#1051510).\n- grace: replace BUG_ON by WARN_ONCE in exit_net hook (git-fixes).\n- gso_segment: Reset skb->mac_len after modifying network header (networking-stable-18_09_24).\n- hid: Add quirk for Primax PIXART OEM mice (bsc#1119410).\n- hid: hiddev: fix potential Spectre v1 (bsc#1051510).\n- hid: input: Ignore battery reported by Symbol DS4308 (bsc#1051510).\n- hid: multitouch: Add pointstick support for Cirque Touchpad (bsc#1051510).\n- hid: uhid: forbid UHID_CREATE under KERNEL_DS or elevated privileges (bsc#1051510).\n- hv_netvsc: ignore devices that are not PCI (networking-stable-18_09_11).\n- hwmon: (core) Fix double-free in __hwmon_device_register() (bsc#1051510).\n- hwmon: (ibmpowernv) Remove bogus __init annotations (bsc#1051510).\n- hwmon: (ina2xx) Fix current value calculation (bsc#1051510).\n- hwmon (ina2xx) Fix NULL id pointer in probe() (bsc#1051510).\n- hwmon: (nct6775) Fix potential Spectre v1 (bsc#1051510).\n- hwmon: (pmbus) Fix page count auto-detection (bsc#1051510).\n- hwmon: (pwm-fan) Set fan speed to 0 on suspend (bsc#1051510).\n- hwmon: (raspberrypi) Fix initial notify (bsc#1051510).\n- hwmon: (w83795) temp4_type has writable permission (bsc#1051510).\n- hwpoison, memory_hotplug: allow hwpoisoned pages to be offlined (bnc#1116336).\n- hwrng: core - document the quality field (bsc#1051510).\n- i2c: axxia: properly handle master timeout (bsc#1051510).\n- i2c: scmi: Fix probe error on devices with an empty SMB0001 ACPI device node (bsc#1051510).\n- IB/hfi1: Add mtu check for operational data VLs (bsc#1060463 ).\n- ibmvnic: Convert reset work item mutex to spin lock ().\n- ibmvnic: fix accelerated VLAN handling ().\n- ibmvnic: fix index in release_rx_pools (bsc#1115440, bsc#1115433).\n- ibmvnic: Fix non-atomic memory allocation in IRQ context ().\n- ibmvnic: remove ndo_poll_controller ().\n- ibmvnic: Update driver queues after change in ring size support ().\n- IB/rxe: support for 802.1q VLAN on the listener (bsc#1082387).\n- ieee802154: 6lowpan: set IFLA_LINK (bsc#1051510).\n- ieee802154: at86rf230: switch from BUG_ON() to WARN_ON() on problem (bsc#1051510).\n- ieee802154: at86rf230: use __func__ macro for debug messages (bsc#1051510).\n- ieee802154: fakelb: switch from BUG_ON() to WARN_ON() on problem (bsc#1051510).\n- iio: accel: adxl345: convert address field usage in iio_chan_spec (bsc#1051510).\n- iio: ad5064: Fix regulator handling (bsc#1051510).\n- iio: adc: at91: fix acking DRDY irq on simple conversions (bsc#1051510).\n- iio: adc: at91: fix wrong channel number in triggered buffer mode (bsc#1051510).\n- iio: adc: imx25-gcq: Fix leak of device_node in mx25_gcq_setup_cfgs() (bsc#1051510).\n- iio:st_magn: Fix enable device after trigger (bsc#1051510).\n- ima: fix showing large 'violations' or 'runtime_measurements_count' (bsc#1051510).\n- include/linux/pfn_t.h: force '~' to be parsed as an unary operator (bsc#1051510).\n- Include modules.fips in kernel-binary as well as kernel-binary-base ().\n- inet: make sure to grab rcu_read_lock before using ireq->ireq_opt (networking-stable-18_10_16).\n- initramfs: fix initramfs rebuilds w/ compression after disabling (git-fixes).\n- Input: add official Raspberry Pi's touchscreen driver ().\n- Input: cros_ec_keyb - fix button/switch capability reports (bsc#1051510).\n- Input: elan_i2c - add ACPI ID for Lenovo IdeaPad 330-15ARR (bsc#1051510).\n- Input: elan_i2c - add ACPI ID for Lenovo IdeaPad 330-15IGM (bsc#1051510).\n- Input: elan_i2c - add ELAN0620 to the ACPI table (bsc#1051510).\n- Input: elan_i2c - add support for ELAN0621 touchpad (bsc#1051510).\n- Input: hyper-v - fix wakeup from suspend-to-idle (bsc#1051510).\n- Input: matrix_keypad - check for errors from of_get_named_gpio() (bsc#1051510).\n- Input: nomadik-ske-keypad - fix a loop timeout test (bsc#1051510).\n- Input: omap-keypad - fix keyboard debounce configuration (bsc#1051510).\n- Input: synaptics - add PNP ID for ThinkPad P50 to SMBus (bsc#1051510).\n- Input: synaptics - avoid using uninitialized variable when probing (bsc#1051510).\n- Input: synaptics - enable SMBus for HP 15-ay000 (bsc#1051510).\n- Input: xpad - add PDP device id 0x02a4 (bsc#1051510).\n- Input: xpad - add support for Xbox1 PDP Camo series gamepad (bsc#1051510).\n- Input: xpad - avoid using __set_bit() for capabilities (bsc#1051510).\n- Input: xpad - fix some coding style issues (bsc#1051510).\n- Input: xpad - quirk all PDP Xbox One gamepads (bsc#1051510).\n- integrity/security: fix digsig.c build error with header file (bsc#1051510).\n- intel_th: msu: Fix an off-by-one in attribute store (bsc#1051510).\n- iommu/amd: Fix amd_iommu=force_isolation (bsc#1106105).\n- iommu/arm-smmu: Ensure that page-table updates are visible before TLBI (bsc#1106237).\n- iommu/ipmmu-vmsa: Fix crash on early domain free (bsc#1106105).\n- iommu/vt-d: Fix NULL pointer dereference in prq_event_thread() (bsc#1106105).\n- iommu/vt-d: Handle domain agaw being less than iommu agaw (bsc#1106105).\n- iommu/vt-d: Use memunmap to free memremap (bsc#1106105).\n- ip6_tunnel: be careful when accessing the inner header (networking-stable-18_10_16).\n- ip6_tunnel: Fix encapsulation layout (networking-stable-18_11_02).\n- ip6_vti: fix a null pointer deference when destroy vti6 tunnel (networking-stable-18_09_11).\n- ipmi: Fix timer race with module unload (bsc#1051510).\n- ip_tunnel: be careful when accessing the inner header (networking-stable-18_10_16).\n- ip_tunnel: do not force DF when MTU is locked (networking-stable-18_11_21).\n- ipv4: lock mtu in fnhe when received PMTU < net.ipv4.route.min_pmtu (networking-stable-18_11_21).\n- ipv4: tcp: send zero IPID for RST and ACK sent in SYN-RECV and TIME-WAIT state (networking-stable-18_09_11).\n- ipv6: Fix PMTU updates for UDP/raw sockets in presence of VRF (networking-stable-18_11_21).\n- ipv6: fix possible use-after-free in ip6_xmit() (networking-stable-18_09_24).\n- ipv6: mcast: fix a use-after-free in inet6_mc_check (networking-stable-18_11_02).\n- ipv6/ndisc: Preserve IPv6 control buffer if protocol error handlers are called (networking-stable-18_11_02).\n- ipv6: take rcu lock in rawv6_send_hdrinc() (networking-stable-18_10_16).\n- iwlwifi: add new cards for 9560, 9462, 9461 and killer series (bsc#1051510).\n- iwlwifi: dbg: allow wrt collection before ALIVE (bsc#1051510).\n- iwlwifi: do not WARN on trying to dump dead firmware (bsc#1051510).\n- iwlwifi: fix LED command capability bit (bsc#1119086).\n- iwlwifi: fix non_shared_ant for 22000 devices (bsc#1119086).\n- iwlwifi: fix wrong WGDS_WIFI_DATA_SIZE (bsc#1119086).\n- iwlwifi: mvm: check for short GI only for OFDM (bsc#1051510).\n- iwlwifi: mvm: check return value of rs_rate_from_ucode_rate() (bsc#1051510).\n- iwlwifi: mvm: do not send GEO_TX_POWER_LIMIT to old firmwares (bsc#1119086).\n- iwlwifi: mvm: do not use SAR Geo if basic SAR is not used (bsc#1051510).\n- iwlwifi: mvm: fix BAR seq ctrl reporting (bsc#1051510).\n- iwlwifi: mvm: fix regulatory domain update when the firmware starts (bsc#1051510).\n- iwlwifi: mvm: support sta_statistics() even on older firmware (bsc#1051510).\n- iwlwifi: nvm: get num of hw addresses from firmware (bsc#1119086).\n- iwlwifi: pcie: avoid empty free RB queue (bsc#1051510).\n- iwlwifi: pcie: do not reset TXQ write pointer (bsc#1051510).\n- jffs2: free jffs2_sb_info through jffs2_kill_sb() (bsc#1118767).\n- jump_label: Split out code under the hotplug lock (bsc#1106913).\n- kabi: hide new member in struct iommu_table from genksyms (bsc#1061840).\n- kabi: hwpoison, memory_hotplug: allow hwpoisoned pages to be offlined (bnc#1116336).\n- kabi: mask raw in struct bpf_reg_state (bsc#1083647).\n- kabi: powerpc: export __find_linux_pte as __find_linux_pte_or_hugepte (bsc#1061840).\n- kabi: powerpc: Revert npu callback signature change (bsc#1055120).\n- kabi protect hnae_ae_ops (bsc#1104353).\n- kabi/severities: ignore __xive_vm_h_* KVM internal symbols.\n- kbuild: allow to use GCC toolchain not in Clang search path (git-fixes).\n- kbuild: fix # escaping in .cmd files for future Make (git-fixes).\n- kbuild: fix kernel/bounds.c 'W=1' warning (bsc#1051510).\n- kbuild: fix linker feature test macros when cross compiling with Clang (git-fixes).\n- kbuild: make missing $DEPMOD a Warning instead of an Error (git-fixes).\n- kbuild: move '_all' target out of $(KBUILD_SRC) conditional (bsc#1114279).\n- kbuild: rpm-pkg: keep spec file until make mrproper (git-fixes).\n- kbuild: suppress packed-not-aligned warning for default setting only (git-fixes).\n- kbuild: verify that $DEPMOD is installed (git-fixes).\n- kdb: use memmove instead of overlapping memcpy (bsc#1120954).\n- kernfs: Replace strncpy with memcpy (bsc#1120053).\n- kernfs: update comment about kernfs_path() return value (bsc#1051510).\n- keys: Fix the use of the C++ keyword 'private' in uapi/linux/keyctl.h (Git-fixes).\n- kgdboc: Passing ekgdboc to command line causes panic (bsc#1051510).\n- kobject: Replace strncpy with memcpy (git-fixes).\n- kprobes: Make list and blacklist root user read only (git-fixes).\n- kvm: arm/arm64: Introduce vcpu_el1_is_32bit (bsc#1110998).\n- kvm: nVMX: Always reflect #NM VM-exits to L1 (bsc#1106240).\n- kvm: nVMX: move check_vmentry_postreqs() call to nested_vmx_enter_non_root_mode() (bsc#1106240).\n- kvm: PPC: Add pt_regs into kvm_vcpu_arch and move vcpu->arch.gpr[] into it (bsc#1061840).\n- kvm: PPC: Avoid marking DMA-mapped pages dirty in real mode (bsc#1061840).\n- kvm: PPC: Book3S: Add MMIO emulation for VMX instructions (bsc#1061840).\n- kvm: PPC: Book3S: Allow backing bigger guest IOMMU pages with smaller physical pages (bsc#1061840).\n- kvm: PPC: Book3S: Check KVM_CREATE_SPAPR_TCE_64 parameters (bsc#1061840).\n- kvm: PPC: Book3S: Eliminate some unnecessary checks (bsc#1061840).\n- kvm: PPC: Book3S: Fix compile error that occurs with some gcc versions (bsc#1061840).\n- kvm: PPC: Book3S: Fix matching of hardware and emulated TCE tables (bsc#1061840).\n- kvm: PPC: Book3S HV: Add of_node_put() in success path (bsc#1061840).\n- kvm: PPC: Book3S HV: Add 'online' register to ONE_REG interface (bsc#1061840).\n- kvm: PPC: Book3S HV: Allow creating max number of VCPUs on POWER9 (bsc#1061840).\n- kvm: PPC: Book3S HV: Allow HPT and radix on the same core for POWER9 v2.2 (bsc#1061840).\n- kvm: PPC: Book3S HV: Avoid crash from THP collapse during radix page fault (bsc#1061840).\n- kvm: PPC: Book3S HV: Avoid shifts by negative amounts (bsc#1061840).\n- kvm: PPC: Book3S HV: Check DR not IR to chose real vs virt mode MMIOs (bsc#1061840).\n- kvm: PPC: Book3S HV: Do not truncate HPTE index in xlate function (bsc#1061840).\n- kvm: PPC: Book3S HV: Do not use compound_order to determine host mapping size (bsc#1061840).\n- kvm: PPC: Book3S HV: Do not use existing 'prodded' flag for XIVE escalations (bsc#1061840).\n- kvm: PPC: Book 3S HV: Do ptesync in radix guest exit path (bsc#1061840).\n- kvm: PPC: Book3S HV: Do SLB load/unload with guest LPCR value loaded (bsc#1061840).\n- kvm: PPC: Book3S HV: Enable migration of decrementer register (bsc#1061840).\n- kvm: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm (bsc#1061840).\n- kvm: PPC: Book3S HV: Fix conditions for starting vcpu (bsc#1061840).\n- kvm: PPC: Book3S HV: Fix constant size warning (bsc#1061840).\n- kvm: PPC: Book3S HV: Fix duplication of host SLB entries (bsc#1061840).\n- kvm: PPC: Book3S HV: Fix guest r11 corruption with POWER9 TM workarounds (bsc#1061840).\n- kvm: PPC: Book3S HV: Fix handling of large pages in radix page fault handler (bsc#1061840).\n- kvm: PPC: Book3S HV: Fix handling of secondary HPTEG in HPT resizing code (bsc#1061840).\n- kvm: PPC: Book3S HV: Fix inaccurate comment (bsc#1061840).\n- kvm: PPC: Book3S HV: Fix kvmppc_bad_host_intr for real mode interrupts (bsc#1061840).\n- kvm: PPC: Book3S HV: Fix trap number return from __kvmppc_vcore_entry (bsc#1061840).\n- kvm: PPC: Book3S HV: Fix typo in kvmppc_hv_get_dirty_log_radix() (bsc#1061840).\n- kvm: PPC: Book3S HV: Fix VRMA initialization with 2MB or 1GB memory backing (bsc#1061840).\n- kvm: PPC: Book3S HV: Handle 1GB pages in radix page fault handler (bsc#1061840).\n- kvm: PPC: Book3S HV: Improve handling of debug-trigger HMIs on POWER9 (bsc#1061840).\n- kvm: PPC: Book3S HV: Keep XIVE escalation interrupt masked unless ceded (bsc#1061840).\n- kvm: PPC: Book3S HV: Lockless tlbie for HPT hcalls (bsc#1061840).\n- kvm: PPC: Book3S HV: Make HPT resizing work on POWER9 (bsc#1061840).\n- kvm: PPC: Book3S HV: Make radix clear pte when unmapping (bsc#1061840).\n- kvm: PPC: Book3S HV: Make radix use correct tlbie sequence in kvmppc_radix_tlbie_page (bsc#1061840).\n- kvm: PPC: Book3S HV: Make xive_pushed a byte, not a word (bsc#1061840).\n- kvm: PPC: Book3S HV: Pack VCORE IDs to access full VCPU ID space (bsc#1061840).\n- kvm: PPC: Book3S HV: radix: Do not clear partition PTE when RC or write bits do not match (bsc#1061840).\n- kvm: PPC: Book3S HV: Radix page fault handler optimizations (bsc#1061840).\n- kvm: PPC: Book3S HV: radix: Refine IO region partition scope attributes (bsc#1061840).\n- kvm: PPC: Book3S HV: Read kvm->arch.emul_smt_mode under kvm->lock (bsc#1061840).\n- kvm: PPC: Book3S HV: Recursively unmap all page table entries when unmapping (bsc#1061840).\n- kvm: PPC: Book3S HV: Remove useless statement (bsc#1061840).\n- kvm: PPC: Book3S HV: Remove vcpu->arch.dec usage (bsc#1061840).\n- kvm: PPC: Book3S HV: Send kvmppc_bad_interrupt NMIs to Linux handlers (bsc#1061840).\n- kvm: PPC: Book3S HV: Set RWMR on POWER8 so PURR/SPURR count correctly (bsc#1061840).\n- kvm: PPC: Book3S HV: Snapshot timebase offset on guest entry (bsc#1061840).\n- kvm: PPC: Book3S HV: Streamline setting of reference and change bits (bsc#1061840).\n- kvm: PPC: Book3S HV: Use a helper to unmap ptes in the radix fault path (bsc#1061840).\n- kvm: PPC: Book3S HV: Use __gfn_to_pfn_memslot() in page fault handler (bsc#1061840).\n- kvm: PPC: Book3S HV: XIVE: Resend re-routed interrupts on CPU priority change (bsc#1061840).\n- kvm: PPC: Book3S PR: Add guest MSR parameter for kvmppc_save_tm()/kvmppc_restore_tm() (bsc#1061840).\n- kvm: PPC: Book3S PR: Enable use on POWER9 inside HPT-mode guests (bsc#1118484).\n- kvm: PPC: Book3S PR: Move kvmppc_save_tm/kvmppc_restore_tm to separate file (bsc#1061840).\n- kvm: PPC: Book3S: Use correct page shift in H_STUFF_TCE (bsc#1061840).\n- kvm: PPC: Fix a mmio_host_swabbed uninitialized usage issue (bsc#1061840).\n- kvm: PPC: Make iommu_table::it_userspace big endian (bsc#1061840).\n- kvm: PPC: Move nip/ctr/lr/xer registers to pt_regs in kvm_vcpu_arch (bsc#1061840).\n- kvm: PPC: Use seq_puts() in kvmppc_exit_timing_show() (bsc#1061840).\n- kvm: s390: vsie: copy wrapping keys to right place (git-fixes).\n- kvm: svm: Ensure an IBPB on all affected CPUs when freeing a vmcb (bsc#1114279).\n- kvm: VMX: re-add ple_gap module parameter (bsc#1106240).\n- kvm: x86: Fix kernel info-leak in KVM_HC_CLOCK_PAIRING hypercall (bsc#1106240).\n- libata: whitelist all SAMSUNG MZ7KM* solid-state disks (bsc#1051510).\n- libceph: bump CEPH_MSG_MAX_DATA_LEN (bsc#1114839).\n- libceph: fall back to sendmsg for slab pages (bsc#1118316).\n- libertas: do not set URB_ZERO_PACKET on IN USB transfer (bsc#1051510).\n- libertas_tf: prevent underflow in process_cmdrequest() (bsc#1119086).\n- libnvdimm, dimm: Maximize label transfer size (bsc#1111921, bsc#1113408, bsc#1113972).\n- libnvdimm: Hold reference on parent while scheduling async init (bsc#1116891).\n- libnvdimm, label: change nvdimm_num_label_slots per UEFI 2.7 (bsc#1111921, bsc#1113408, bsc#1113972).\n- libnvdimm, label: Fix sparse warning (bsc#1111921, bsc#1113408, bsc#1113972).\n- libnvdimm, pfn: Pad pfn namespaces relative to other regions (bsc#1118962).\n- libnvdimm, region: Fail badblocks listing for inactive regions (bsc#1116899).\n- lib/raid6: Fix arm64 test build (bsc#1051510).\n- lib/ubsan.c: do not mark __ubsan_handle_builtin_unreachable as noreturn (bsc#1051510).\n- Limit max FW API version for QCA9377 (bsc#1121714, bsc#1121715).\n- linux/bitmap.h: fix type of nbits in bitmap_shift_right() (bsc#1051510).\n- livepatch: create and include UAPI headers ().\n- llc: set SOCK_RCU_FREE in llc_sap_add_socket() (networking-stable-18_11_02).\n- lockd: fix 'list_add double add' caused by legacy signal interface (git-fixes).\n- locking/barriers: Convert users of lockless_dereference() to READ_ONCE() (Git-fixes).\n- locking/static_keys: Improve uninitialized key warning (bsc#1106913).\n- mac80211: Always report TX status (bsc#1051510).\n- mac80211: Clear beacon_int in ieee80211_do_stop (bsc#1051510).\n- mac80211: fix reordering of buffered broadcast packets (bsc#1051510).\n- mac80211: fix TX status reporting for ieee80211s (bsc#1051510).\n- mac80211_hwsim: do not omit multicast announce of first added radio (bsc#1051510).\n- mac80211_hwsim: fix module init error paths for netlink (bsc#1051510).\n- mac80211_hwsim: Timer should be initialized before device registered (bsc#1051510).\n- mac80211: ignore NullFunc frames in the duplicate detection (bsc#1051510).\n- mac80211: ignore tx status for PS stations in ieee80211_tx_status_ext (bsc#1051510).\n- mac80211: TDLS: fix skb queue/priority assignment (bsc#1051510).\n- mach64: fix display corruption on big endian machines (bsc#1113722)\n- mach64: fix image corruption due to reading accelerator registers (bsc#1113722)\n- mailbox: PCC: handle parse error (bsc#1051510).\n- make sure that __dentry_kill() always invalidates d_seq, unhashed or not (git-fixes).\n- Mark HI and TASKLET softirq synchronous (git-fixes).\n- md: allow metadata updates while suspending an array - fix (git-fixes).\n- MD: fix invalid stored role for a disk - try2 (git-fixes).\n- md: fix NULL dereference of mddev->pers in remove_and_add_spares() (git-fixes).\n- md: fix raid10 hang issue caused by barrier (git-fixes).\n- md/raid10: fix that replacement cannot complete recovery after reassemble (git-fixes).\n- md/raid1: add error handling of read error from FailFast device (git-fixes).\n- md/raid5-cache: disable reshape completely (git-fixes).\n- md/raid5: fix data corruption of replacements after originals dropped (git-fixes).\n- media: cx231xx: fix potential sign-extension overflow on large shift (bsc#1051510).\n- media: dvb: fix compat ioctl translation (bsc#1051510).\n- media: em28xx: fix input name for Terratec AV 350 (bsc#1051510).\n- media: em28xx: Fix use-after-free when disconnecting (bsc#1051510).\n- media: em28xx: make v4l2-compliance happier by starting sequence on zero (bsc#1051510).\n- media: em28xx: use a default format if TRY_FMT fails (bsc#1051510).\n- media: omap3isp: Unregister media device as first (bsc#1051510).\n- media: pci: cx23885: handle adding to list failure (bsc#1051510).\n- media: tvp5150: avoid going past array on v4l2_querymenu() (bsc#1051510).\n- media: tvp5150: fix switch exit in set control handler (bsc#1051510).\n- media: tvp5150: fix width alignment during set_selection() (bsc#1051510).\n- media: uvcvideo: Fix uvc_alloc_entity() allocation alignment (bsc#1051510).\n- media: v4l2-tpg: fix kernel oops when enabling HFLIP and OSD (bsc#1051510).\n- media: vsp1: Fix YCbCr planar formats pitch calculation (bsc#1051510).\n- memory_hotplug: cond_resched in __remove_pages (bnc#1114178).\n- mfd: arizona: Correct calling of runtime_put_sync (bsc#1051510).\n- mfd: menelaus: Fix possible race condition and leak (bsc#1051510).\n- mfd: omap-usb-host: Fix dts probe of children (bsc#1051510).\n- mlxsw: spectrum: Fix IP2ME CPU policer configuration (networking-stable-18_11_21).\n- mmc: bcm2835: reset host on timeout (bsc#1051510).\n- mmc: core: Allow BKOPS and CACHE ctrl even if no HPI support (bsc#1051510).\n- mmc: core: Reset HPI enabled state during re-init and in case of errors (bsc#1051510).\n- mmc: core: Use a minimum 1600ms timeout when enabling CACHE ctrl (bsc#1051510).\n- mmc: dw_mmc-bluefield: Add driver extension (bsc#1118752).\n- mmc: dw_mmc-k3: add sd support for hi3660 (bsc#1118752).\n- mmc: dw_mmc-rockchip: correct property names in debug (bsc#1051510).\n- mmc: OMAP: fix broken MMC on OMAP15XX/OMAP5910/OMAP310 (bsc#1051510).\n- mmc: omap_hsmmc: fix DMA API warning (bsc#1051510).\n- mmc: sdhci: fix the timeout check window for clock and reset (bsc#1051510).\n- mmc: sdhci-pci-o2micro: Add quirk for O2 Micro dev 0x8620 rev 0x01 (bsc#1051510).\n- mm: do not miss the last page because of round-off error (bnc#1118798).\n- mm: do not warn about large allocations for slab (git fixes (slab)).\n- mm: handle no memcg case in memcg_kmem_charge() properly (bnc#1113677).\n- mm/huge_memory.c: reorder operations in __split_huge_page_tail() (VM Functionality bsc#1119962).\n- mm/huge_memory: fix lockdep complaint on 32-bit i_size_read() (VM Functionality, bsc#1121599).\n- mm/huge_memory: rename freeze_page() to unmap_page() (VM Functionality, bsc#1121599).\n- mm/huge_memory: splitting set mapping+index before unfreeze (VM Functionality, bsc#1121599).\n- mm: hugetlb: yield when prepping struct pages (git fixes (memory initialisation)).\n- mm/khugepaged: collapse_shmem() do not crash on Compound (VM Functionality, bsc#1121599).\n- mm/khugepaged: collapse_shmem() remember to clear holes (VM Functionality, bsc#1121599).\n- mm/khugepaged: collapse_shmem() stop if punched or truncated (VM Functionality, bsc#1121599).\n- mm/khugepaged: collapse_shmem() without freezing new_page (VM Functionality, bsc#1121599).\n- mm/khugepaged: fix crashes due to misaccounted holes (VM Functionality, bsc#1121599).\n- mm/khugepaged: minor reorderings in collapse_shmem() (VM Functionality, bsc#1121599).\n- mm: lower the printk loglevel for __dump_page messages (generic hotplug debugability).\n- mm, memory_hotplug: be more verbose for memory offline failures (generic hotplug debugability).\n- mm, memory_hotplug: drop pointless block alignment checks from __offline_pages (generic hotplug debugability).\n- mm, memory_hotplug: print reason for the offlining failure (generic hotplug debugability).\n- mm: migration: fix migration of huge PMD shared pages (bnc#1086423).\n- mm: only report isolation failures when offlining memory (generic hotplug debugability).\n- mm: print more information about mapping in __dump_page (generic hotplug debugability).\n- mm: put_and_wait_on_page_locked() while page is migrated (bnc#1109272).\n- mm: rework memcg kernel stack accounting (bnc#1113677).\n- mm: sections are not offlined during memory hotremove (bnc#1119968).\n- mm: shmem.c: Correctly annotate new inodes for lockdep (Git fixes: shmem).\n- mm/vmstat.c: fix NUMA statistics updates (git fixes).\n- modpost: ignore livepatch unresolved relocations ().\n- mount: Do not allow copying MNT_UNBINDABLE|MNT_LOCKED mounts (bsc#1117819).\n- mount: Prevent MNT_DETACH from disconnecting locked mounts (bsc#1117820).\n- mount: Retest MNT_LOCKED in do_umount (bsc#1117818).\n- Move dell_rbu fix to sorted section (bsc#1087978).\n- mtd: cfi: convert inline functions to macros (git-fixes).\n- mtd: Fix comparison in map_word_andequal() (git-fixes).\n- namei: allow restricted O_CREAT of FIFOs and regular files (bsc#1118766).\n- nbd: do not allow invalid blocksize settings (Git-fixes).\n- neighbour: confirm neigh entries when ARP packet is received (networking-stable-18_09_24).\n- net/af_iucv: drop inbound packets with invalid flags (bnc#1113501, LTC#172679).\n- net/af_iucv: fix skb handling on HiperTransport xmit error (bnc#1113501, LTC#172679).\n- net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT (networking-stable-18_09_24).\n- net: aquantia: memory corruption on jumbo frames (networking-stable-18_10_16).\n- net: bcmgenet: Poll internal PHY for GENETv5 (networking-stable-18_11_02).\n- net: bcmgenet: protect stop from timeout (networking-stable-18_11_21).\n- net: bcmgenet: use MAC link status for fixed phy (networking-stable-18_09_11).\n- net: bgmac: Fix endian access in bgmac_dma_tx_ring_free() (bsc#1051510).\n- net: bridge: remove ipv6 zero address check in mcast queries (git-fixes).\n- net: dsa: bcm_sf2: Call setup during switch resume (networking-stable-18_10_16).\n- net: dsa: bcm_sf2: Fix unbind ordering (networking-stable-18_10_16).\n- net: dsa: mv88e6xxx: Fix binding documentation for MDIO busses (git-fixes).\n- net: dsa: qca8k: Add QCA8334 binding documentation (git-fixes).\n- net: ena: add functions for handling Low Latency Queues in ena_com (bsc#1111696 bsc#1117561).\n- net: ena: add functions for handling Low Latency Queues in ena_netdev (bsc#1111696 bsc#1117561).\n- net: ena: change rx copybreak default to reduce kernel memory pressure (bsc#1111696 bsc#1117561).\n- net: ena: complete host info to match latest ENA spec (bsc#1111696 bsc#1117561).\n- net: ena: enable Low Latency Queues (bsc#1111696 bsc#1117561).\n- net: ena: explicit casting and initialization, and clearer error handling (bsc#1111696 bsc#1117561).\n- net: ena: fix auto casting to boolean (bsc#1111696 bsc#1117561).\n- net: ena: fix compilation error in xtensa architecture (bsc#1111696 bsc#1117561).\n- net: ena: fix crash during ena_remove() (bsc#1111696 bsc#1117561).\n- net: ena: fix crash during failed resume from hibernation (bsc#1111696 bsc#1117561).\n- net: ena: fix indentations in ena_defs for better readability (bsc#1111696 bsc#1117561).\n- net: ena: Fix Kconfig dependency on X86 (bsc#1111696 bsc#1117561).\n- net: ena: fix NULL dereference due to untimely napi initialization (bsc#1111696 bsc#1117561).\n- net: ena: fix rare bug when failed restart/resume is followed by driver removal (bsc#1111696 bsc#1117561).\n- net: ena: fix warning in rmmod caused by double iounmap (bsc#1111696 bsc#1117561).\n- net: ena: introduce Low Latency Queues data structures according to ENA spec (bsc#1111696 bsc#1117561).\n- net: ena: limit refill Rx threshold to 256 to avoid latency issues (bsc#1111696 bsc#1117561).\n- net: ena: minor performance improvement (bsc#1111696 bsc#1117561).\n- net: ena: remove ndo_poll_controller (bsc#1111696 bsc#1117561).\n- net: ena: remove redundant parameter in ena_com_admin_init() (bsc#1111696 bsc#1117561).\n- net: ena: update driver version from 2.0.1 to 2.0.2 (bsc#1111696 bsc#1117561).\n- net: ena: update driver version to 2.0.1 (bsc#1111696 bsc#1117561).\n- net: ena: use CSUM_CHECKED device indication to report skb's checksum status (bsc#1111696 bsc#1117561).\n- net: fec: do not dump RX FIFO register when not available (networking-stable-18_11_02).\n- net-gro: reset skb->pkt_type in napi_reuse_skb() (networking-stable-18_11_21).\n- net: hns3: Add nic state check before calling netif_tx_wake_queue (bsc#1104353).\n- net: hns3: Add support for hns3_nic_netdev_ops.ndo_do_ioctl (bsc#1104353).\n- net: hns3: bugfix for buffer not free problem during resetting (bsc#1104353).\n- net: hns3: bugfix for handling mailbox while the command queue reinitialized (bsc#1104353).\n- net: hns3: bugfix for hclge_mdio_write and hclge_mdio_read (bsc#1104353).\n- net: hns3: bugfix for is_valid_csq_clean_head() (bsc#1104353 ).\n- net: hns3: bugfix for reporting unknown vector0 interrupt repeatly problem (bsc#1104353).\n- net: hns3: bugfix for rtnl_lock's range in the hclgevf_reset() (bsc#1104353).\n- net: hns3: bugfix for the initialization of command queue's spin lock (bsc#1104353).\n- net: hns3: Check hdev state when getting link status (bsc#1104353).\n- net: hns3: Clear client pointer when initialize client failed or unintialize finished (bsc#1104353).\n- net: hns3: Fix cmdq registers initialization issue for vf (bsc#1104353).\n- net: hns3: Fix error of checking used vlan id (bsc#1104353 ).\n- net: hns3: Fix ets validate issue (bsc#1104353).\n- net: hns3: Fix for netdev not up problem when setting mtu (bsc#1104353).\n- net: hns3: Fix for out-of-bounds access when setting pfc back pressure (bsc#1104353).\n- net: hns3: Fix for packet buffer setting bug (bsc#1104353 ).\n- net: hns3: Fix for rx vlan id handle to support Rev 0x21 hardware (bsc#1104353).\n- net: hns3: Fix for setting speed for phy failed problem (bsc#1104353).\n- net: hns3: Fix for vf vlan delete failed problem (bsc#1104353 ).\n- net: hns3: Fix loss of coal configuration while doing reset (bsc#1104353).\n- net: hns3: Fix parameter type for q_id in hclge_tm_q_to_qs_map_cfg() (bsc#1104353).\n- net: hns3: Fix ping exited problem when doing lp selftest (bsc#1104353).\n- net: hns3: Preserve vlan 0 in hardware table (bsc#1104353 ).\n- net: hns3: remove unnecessary queue reset in the hns3_uninit_all_ring() (bsc#1104353).\n- net: hns3: Set STATE_DOWN bit of hdev state when stopping net (bsc#1104353).\n- net: hns: fix for unmapping problem when SMMU is on (networking-stable-18_10_16).\n- net: hp100: fix always-true check for link up state (networking-stable-18_09_24).\n- net: ibm: fix return type of ndo_start_xmit function ().\n- net/ibmnvic: Fix deadlock problem in reset ().\n- net/ibmvnic: Fix RTNL deadlock during device reset (bnc#1115431).\n- net: ipmr: fix unresolved entry dumps (networking-stable-18_11_02).\n- net: ipv4: do not let PMTU updates increase route MTU (git-fixes).\n- net/ipv6: Display all addresses in output of /proc/net/if_inet6 (networking-stable-18_10_16).\n- net/ipv6: Fix index counter for unicast addresses in in6_dump_addrs (networking-stable-18_11_02).\n- netlabel: check for IPV4MASK in addrinfo_get (networking-stable-18_10_16).\n- net: macb: do not disable MDIO bus at open/close time (networking-stable-18_09_11).\n- net/mlx4_core: Correctly set PFC param if global pause is turned off (bsc#1046299).\n- net/mlx5: Check for error in mlx5_attach_interface (networking-stable-18_09_18).\n- net/mlx5e: Fix selftest for small MTUs (networking-stable-18_11_21).\n- net/mlx5e: Set vlan masks for all offloaded TC rules (networking-stable-18_10_16).\n- net/mlx5: E-Switch, Fix memory leak when creating switchdev mode FDB tables (networking-stable-18_09_18).\n- net/mlx5: E-Switch, Fix out of bound access when setting vport rate (networking-stable-18_10_16).\n- net/mlx5: Fix debugfs cleanup in the device init/remove flow (networking-stable-18_09_18).\n- net/mlx5: Fix use-after-free in self-healing flow (networking-stable-18_09_18).\n- net/mlx5: Take only bit 24-26 of wqe.pftype_wq for page fault type (networking-stable-18_11_02).\n- net: mvpp2: Extract the correct ethtype from the skb for tx csum offload (networking-stable-18_10_16).\n- net: mvpp2: fix a txq_done race condition (networking-stable-18_10_16).\n- net/packet: fix packet drop as of virtio gso (networking-stable-18_10_16).\n- net: phy: mdio-gpio: Fix working over slow can_sleep GPIOs (networking-stable-18_11_21).\n- net: qca_spi: Fix race condition in spi transfers (networking-stable-18_09_18).\n- net: qmi_wwan: add Wistron Neweb D19Q1 (bsc#1051510).\n- net: sched: action_ife: take reference to meta module (networking-stable-18_09_11).\n- net/sched: act_pedit: fix dump of extended layered op (networking-stable-18_09_11).\n- net/sched: act_sample: fix NULL dereference in the data path (networking-stable-18_09_24).\n- net: sched: Fix for duplicate class dump (networking-stable-18_11_02).\n- net: sched: Fix memory exposure from short TCA_U32_SEL (networking-stable-18_09_11).\n- net: sched: gred: pass the right attribute to gred_change_table_def() (networking-stable-18_11_02).\n- net: smsc95xx: Fix MTU range (networking-stable-18_11_21).\n- net: socket: fix a missing-check bug (networking-stable-18_11_02).\n- net: stmmac: Fix stmmac_mdio_reset() when building stmmac as modules (networking-stable-18_11_02).\n- net: stmmac: Fixup the tail addr setting in xmit path (networking-stable-18_10_16).\n- net: systemport: Fix wake-up interrupt race during resume (networking-stable-18_10_16).\n- net: systemport: Protect stop from timeout (networking-stable-18_11_21).\n- net: udp: fix handling of CHECKSUM_COMPLETE packets (networking-stable-18_11_02).\n- net/usb: cancel pending work when unbinding smsc75xx (networking-stable-18_10_16).\n- net: usb: r8152: constify usb_device_id (bsc#1119749).\n- net: usb: r8152: use irqsave() in USB's complete callback (bsc#1119749).\n- nfc: nfcmrvl_uart: fix OF child-node lookup (bsc#1051510).\n- nfp: wait for posted reconfigs when disabling the device (networking-stable-18_09_11).\n- nfs: Avoid RCU usage in tracepoints (git-fixes).\n- nfs: commit direct writes even if they fail partially (git-fixes).\n- nfsd4: permit layoutget of executable-only files (git-fixes).\n- nfsd: check for use of the closed special stateid (git-fixes).\n- nfsd: CLOSE SHOULD return the invalid special stateid for NFSv4.x (x>0) (git-fixes).\n- nfsd: deal with revoked delegations appropriately (git-fixes).\n- nfsd: Ensure we check stateid validity in the seqid operation checks (git-fixes).\n- nfsd: Fix another OPEN stateid race (git-fixes).\n- nfsd: fix corrupted reply to badly ordered compound (git-fixes).\n- nfsd: fix potential use-after-free in nfsd4_decode_getdeviceinfo (git-fixes).\n- nfsd: Fix stateid races between OPEN and CLOSE (git-fixes).\n- nfs: do not wait on commit in nfs_commit_inode() if there were no commit requests (git-fixes).\n- nfsd: restrict rd_maxcount to svc_max_payload in nfsd_encode_readdir (git-fixes).\n- nfs: Ensure we commit after writeback is complete (bsc#1111809).\n- nfs: Fix an incorrect type in struct nfs_direct_req (git-fixes).\n- nfs: Fix a typo in nfs_rename() (git-fixes).\n- nfs: Fix typo in nomigration mount option (git-fixes).\n- nfs: Fix unstable write completion (git-fixes).\n- nfsv4.0 fix client reference leak in callback (git-fixes).\n- nfsv4.1: Fix a potential layoutget/layoutrecall deadlock (git-fixes).\n- nfsv4.1 fix infinite loop on I/O (git-fixes).\n- nfsv4.1: Fix the client behaviour on NFS4ERR_SEQ_FALSE_RETRY (git-fixes).\n- nfsv4.1: Fix up replays of interrupted requests (git-fixes).\n- nfsv4: Fix a typo in nfs41_sequence_process (git-fixes).\n- nl80211: Fix possible Spectre-v1 for CQM RSSI thresholds (bsc#1051510).\n- nl80211: Fix possible Spectre-v1 for NL80211_TXRATE_HT (bsc#1051510).\n- nospec: Allow index argument to have const-qualified type (git-fixes)\n- nospec: Include <asm/barrier.h> dependency (bsc#1114279).\n- nospec: Kill array_index_nospec_mask_check() (git-fixes).\n- nvdimm: Clarify comment in sizeof_namespace_index (bsc#1111921, bsc#1113408, bsc#1113972).\n- nvdimm: Remove empty if statement (bsc#1111921, bsc#1113408, bsc#1113972).\n- nvdimm: Sanity check labeloff (bsc#1111921, bsc#1113408, bsc#1113972).\n- nvdimm: Split label init out from the logic for getting config data (bsc#1111921, bsc#1113408, bsc#1113972).\n- nvdimm: Use namespace index data to reduce number of label reads needed (bsc#1111921, bsc#1113408, bsc#1113972).\n- nvme-fc: resolve io failures during connect (bsc#1116803).\n- nvme: Free ctrl device name on init failure ().\n- nvme-multipath: zero out ANA log buffer (bsc#1105168).\n- nvme: validate controller state before rescheduling keep alive (bsc#1103257).\n- objtool: Detect RIP-relative switch table references (bsc#1058115).\n- objtool: Detect RIP-relative switch table references, part 2 (bsc#1058115).\n- objtool: Fix another switch table detection issue (bsc#1058115).\n- objtool: Fix double-free in .cold detection error path (bsc#1058115).\n- objtool: Fix GCC 8 cold subfunction detection for aliased functions (bsc#1058115).\n- objtool: Fix 'noreturn' detection for recursive sibling calls (bsc#1058115).\n- objtool: Fix segfault in .cold detection with -ffunction-sections (bsc#1058115).\n- objtool: Support GCC 8's cold subfunctions (bsc#1058115).\n- objtool: Support GCC 8 switch tables (bsc#1058115).\n- ocfs2: fix a misuse a of brelse after failing ocfs2_check_dir_entry (bsc#1117817).\n- ocfs2: fix locking for res->tracking and dlm->tracking_list (bsc#1117816).\n- ocfs2: fix ocfs2 read block panic (bsc#1117815).\n- ocfs2: free up write context when direct IO failed (bsc#1117821).\n- ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent (bsc#1117808).\n- of: add helper to lookup compatible child node (bsc#1106110)\n- openvswitch: Fix push/pop ethernet validation (networking-stable-18_11_02).\n- panic: avoid deadlocks in re-entrant console drivers (bsc#1088386).\n- pci: Add ACS quirk for Ampere root ports (bsc#1120058).\n- pci: Add ACS quirk for APM X-Gene devices (bsc#1120058).\n- pci: Add Device IDs for Intel GPU 'spurious interrupt' quirk (bsc#1051510).\n- pci/ASPM: Do not initialize link state when aspm_disabled is set (bsc#1051510).\n- pci/ASPM: Fix link_state teardown on device removal (bsc#1051510).\n- pci: Convert device-specific ACS quirks from NULL termination to ARRAY_SIZE (bsc#1120058).\n- pci: Delay after FLR of Intel DC P3700 NVMe (bsc#1120058).\n- pci: Disable Samsung SM961/PM961 NVMe before FLR (bsc#1120058).\n- pci: dwc: remove duplicate fix (bsc#1115269)\n- pci: Export pcie_has_flr() (bsc#1120058).\n- pci: hv: Use effective affinity mask (bsc#1109772).\n- pci: imx6: Fix link training status detection in link up check (bsc#1109806).\n- pci: iproc: Activate PAXC bridge quirk for more devices (bsc#1120058).\n- pci: iproc: Remove PAXC slot check to allow VF support (bsc#1109806).\n- pci: Mark Ceton InfiniTV4 INTx masking as broken (bsc#1120058).\n- pci: Mark fall-through switch cases before enabling -Wimplicit-fallthrough (bsc#1120058).\n- pci: Mark Intel XXV710 NIC INTx masking as broken (bsc#1120058).\n- pci/MSI: Warn and return error if driver enables MSI/MSI-X twice (bsc#1051510).\n- pci: vmd: Assign vector zero to all bridges (bsc#1109806).\n- pci: vmd: Detach resources after stopping root bus (bsc#1109806).\n- pci: vmd: White list for fast interrupt handlers (bsc#1109806).\n- pcmcia: Implement CLKRUN protocol disabling for Ricoh bridges (bsc#1051510).\n- percpu: make this_cpu_generic_read() atomic w.r.t. interrupts (bsc#1114279).\n- perf: fix invalid bit in diagnostic entry (git-fixes).\n- perf tools: Fix tracing_path_mount proper path (git-fixes).\n- pinctrl: at91-pio4: fix has_config check in atmel_pctl_dt_subnode_to_map() (bsc#1051510).\n- pinctrl: meson: fix pinconf bias disable (bsc#1051510).\n- pinctrl: qcom: spmi-mpp: Fix drive strength setting (bsc#1051510).\n- pinctrl: qcom: spmi-mpp: Fix err handling of pmic_mpp_set_mux (bsc#1051510).\n- pinctrl: spmi-mpp: Fix pmic_mpp_config_get() to be compliant (bsc#1051510).\n- pinctrl: ssbi-gpio: Fix pm8xxx_pin_config_get() to be compliant (bsc#1051510).\n- pipe: match pipe_max_size data type with procfs (git-fixes).\n- platform-msi: Free descriptors in platform_msi_domain_free() (bsc#1051510).\n- platform/x86: acerhdf: Add BIOS entry for Gateway LT31 v1.3307 (bsc#1051510).\n- platform/x86: intel_telemetry: report debugfs failure (bsc#1051510).\n- pnfs: Always free the session slot on error in nfs4_layoutget_handle_exception (git-fixes).\n- pnfs: Do not release the sequence slot until we've processed layoutget on open (git-fixes).\n- pnfs: Prevent the layout header refcount going to zero in pnfs_roc() (git-fixes).\n- powerpc/64s: consolidate MCE counter increment (bsc#1094244).\n- powerpc/64s/hash: Do not use PPC_INVALIDATE_ERAT on CPUs before POWER9 (bsc#1065729).\n- powerpc/64s/radix: Fix process table entry cache invalidation (bsc#1055186, git-fixes).\n- powerpc/boot: Expose Kconfig symbols to wrapper (bsc#1065729).\n- powerpc/boot: Fix build failures with -j 1 (bsc#1065729).\n- powerpc/boot: Fix opal console in boot wrapper (bsc#1065729).\n- powerpc/kvm/booke: Fix altivec related build break (bsc#1061840).\n- powerpc/kvm: Switch kvm pmd allocator to custom allocator (bsc#1061840).\n- powerpc/mm: Fix typo in comments (bsc#1065729).\n- powerpc/mm/hugetlb: initialize the pagetable cache correctly for hugetlb (bsc#1091800).\n- powerpc/mm/keys: Move pte bits to correct headers (bsc#1078248).\n- powerpc/mm: Rename find_linux_pte_or_hugepte() (bsc#1061840).\n- powerpc/npu-dma.c: Fix crash after __mmu_notifier_register failure (bsc#1055120).\n- powerpc/perf: Update raw-event code encoding comment for power8 (bsc#1065729).\n- powerpc/pkeys: Fix handling of pkey state across fork() (bsc#1078248, git-fixes).\n- powerpc/powernv: Add indirect levels to it_userspace (bsc#1061840).\n- powerpc/powernv: Do not select the cpufreq governors (bsc#1065729).\n- powerpc/powernv: Fix concurrency issue with npu->mmio_atsd_usage (bsc#1055120).\n- powerpc/powernv: Fix opal_event_shutdown() called with interrupts disabled (bsc#1065729).\n- powerpc/powernv: Fix save/restore of SPRG3 on entry/exit from stop (idle) (bsc#1055121).\n- powerpc/powernv/ioda: Allocate indirect TCE levels on demand (bsc#1061840).\n- powerpc/powernv/ioda: Finish removing explicit max window size check (bsc#1061840).\n- powerpc/powernv/ioda: Remove explicit max window size check (bsc#1061840).\n- powerpc/powernv: Move TCE manupulation code to its own file (bsc#1061840).\n- powerpc/powernv/npu: Add lock to prevent race in concurrent context init/destroy (bsc#1055120).\n- powerpc/powernv/npu: Do not explicitly flush nmmu tlb (bsc#1055120).\n- powerpc/powernv/npu: Fix deadlock in mmio_invalidate() (bsc#1055120).\n- powerpc/powernv/npu: Prevent overwriting of pnv_npu2_init_contex() callback parameters (bsc#1055120).\n- powerpc/powernv/npu: Use flush_all_mm() instead of flush_tlb_mm() (bsc#1055120).\n- powerpc/powernv/pci: Work around races in PCI bridge enabling (bsc#1055120).\n- powerpc/powernv: Rework TCE level allocation (bsc#1061840).\n- powerpc/pseries: Fix DTL buffer registration (bsc#1065729).\n- powerpc/pseries: Fix how we iterate over the DTL entries (bsc#1065729).\n- powerpc/pseries: Fix 'OF: ERROR: Bad of_node_put() on /cpus' during DLPAR (bsc#1113295).\n- powerpc/pseries/mobility: Extend start/stop topology update scope (bsc#1116950, bsc#1115709).\n- powerpc: pseries: remove dlpar_attach_node dependency on full path (bsc#1113295).\n- powerpc/pseries: Track LMB nid instead of using device tree (bsc#1108270).\n- powerpc/traps: restore recoverability of machine_check interrupts (bsc#1094244).\n- powerpc/xive: Move definition of ESB bits (bsc#1061840).\n- powerpc/xmon: Add ISA v3.0 SPRs to SPR dump (bsc#1061840).\n- power: supply: max8998-charger: Fix platform data retrieval (bsc#1051510).\n- power: supply: olpc_battery: correct the temperature units (bsc#1051510).\n- pppoe: fix reception of frames with no mac header (networking-stable-18_09_24).\n- printk: Fix panic caused by passing log_buf_len to command line (bsc#1117168).\n- provide linux/set_memory.h (bsc#1113295).\n- ptp: fix Spectre v1 vulnerability (bsc#1051510).\n- ptrace: Remove unused ptrace_may_access_sched() and MODE_IBRS (bsc#1106913).\n- pwm: lpss: Release runtime-pm reference from the driver's remove callback (bsc#1051510).\n- pxa168fb: prepare the clock (bsc#1051510).\n- qed: Add driver support for 20G link speed (bsc#1110558).\n- qed: Add support for virtual link (bsc#1111795).\n- qede: Add driver support for 20G link speed (bsc#1110558).\n- qmi_wwan: apply SET_DTR quirk to the SIMCOM shared device ID (bsc#1051510).\n- qmi_wwan: Support dynamic config on Quectel EP06 (bsc#1051510).\n- r8152: add byte_enable for ocp_read_word function (bsc#1119749).\n- r8152: add Linksys USB3GIGV1 id (bsc#1119749).\n- r8152: add r8153_phy_status function (bsc#1119749).\n- r8152: adjust lpm settings for RTL8153 (bsc#1119749).\n- r8152: adjust rtl8153_runtime_enable function (bsc#1119749).\n- r8152: adjust the settings about MAC clock speed down for RTL8153 (bsc#1119749).\n- r8152: adjust U2P3 for RTL8153 (bsc#1119749).\n- r8152: avoid rx queue more than 1000 packets (bsc#1119749).\n- r8152: check if disabling ALDPS is finished (bsc#1119749).\n- r8152: correct the definition (bsc#1119749).\n- r8152: disable RX aggregation on Dell TB16 dock (bsc#1119749).\n- r8152: disable RX aggregation on new Dell TB16 dock (bsc#1119749).\n- r8152: fix wrong checksum status for received IPv4 packets (bsc#1119749).\n- r8152: move calling delay_autosuspend function (bsc#1119749).\n- r8152: move the default coalesce setting for RTL8153 (bsc#1119749).\n- r8152: move the initialization to reset_resume function (bsc#1119749).\n- r8152: move the setting of rx aggregation (bsc#1119749).\n- r8152: replace napi_complete with napi_complete_done (bsc#1119749).\n- r8152: set rx mode early when linking on (bsc#1119749).\n- r8152: split rtl8152_resume function (bsc#1119749).\n- r8152: support new chip 8050 (bsc#1119749).\n- r8152: support RTL8153B (bsc#1119749).\n- r8169: fix NAPI handling under high load (networking-stable-18_11_02).\n- race of lockd inetaddr notifiers vs nlmsvc_rqst change (git-fixes).\n- raid10 BUG_ON in raise_barrier when force is true and conf->barrier is 0 (git-fixes).\n- random: rate limit unseeded randomness warnings (git-fixes).\n- rbd: whitelist RBD_FEATURE_OPERATIONS feature bit (Git-fixes).\n- rcu: Allow for page faults in NMI handlers (bsc#1120092).\n- rdma/bnxt_re: Add missing spin lock initialization (bsc#1050244 ).\n- rdma/bnxt_re: Avoid accessing the device structure after it is freed (bsc#1050244).\n- rdma/bnxt_re: Avoid NULL check after accessing the pointer (bsc#1086283).\n- rdma/bnxt_re: Fix system hang when registration with L2 driver fails (bsc#1086283).\n- rdma/hns: Bugfix pbl configuration for rereg mr (bsc#1104427 ).\n- rdma_rxe: make rxe work over 802.1q VLAN devices (bsc#1082387).\n- rds: fix two RCU related problems (networking-stable-18_09_18).\n- remoteproc: qcom: Fix potential device node leaks (bsc#1051510).\n- reset: hisilicon: fix potential NULL pointer dereference (bsc#1051510).\n- reset: imx7: Fix always writing bits as 0 (bsc#1051510).\n- reset: remove remaining WARN_ON() in <linux/reset.h> (Git-fixes).\n- resource: Include resource end in walk_*() interfaces (bsc#1114279).\n- Revert 'blacklist.conf: blacklist inapplicable commits' This reverts commit 88bd1b2b53990d5518b819968445522fb1392bee. We only build with VIRT_CPU_ACCOUNTING_NATIVE on s390\n- Revert 'ceph: fix dentry leak in splice_dentry()' (bsc#1114839).\n- Revert commit ef9209b642f 'staging: rtl8723bs: Fix indenting errors and an off-by-one mistake in core/rtw_mlme_ext.c' (bsc#1051510).\n- Revert 'iommu/io-pgtable-arm: Check for v7s-incapable systems' (bsc#1106105).\n- Revert 'PCI/ASPM: Do not initialize link state when aspm_disabled is set' (bsc#1051510).\n- Revert 'powerpc/64: Fix checksum folding in csum_add()' (bsc#1065729).\n- Revert 'scsi: lpfc: ls_rjt erroneus FLOGIs' (bsc#1119322).\n- Revert 'usb: dwc3: gadget: skip Set/Clear Halt when invalid' (bsc#1051510).\n- Revert wlcore patch to follow stable tree develpment\n- ring-buffer: Allow for rescheduling when removing pages (bsc#1120238).\n- ring-buffer: Do no reuse reader page if still in use (bsc#1120096).\n- ring-buffer: Mask out the info bits when returning buffer page length (bsc#1120094).\n- rpmsg: Correct support for MODULE_DEVICE_TABLE() (git-fixes).\n- rtc: hctosys: Add missing range error reporting (bsc#1051510).\n- rtc: m41t80: Correct alarm month range with RTC reads (bsc#1051510).\n- rtc: pcf2127: fix a kmemleak caused in pcf2127_i2c_gather_write (bsc#1051510).\n- rtc: snvs: Add timeouts to avoid kernel lockups (bsc#1051510).\n- rtl8xxxu: Fix missing break in switch (bsc#1051510).\n- rtnetlink: Disallow FDB configuration for non-Ethernet device (networking-stable-18_11_02).\n- rtnetlink: fix rtnl_fdb_dump() for ndmsg header (networking-stable-18_10_16).\n- rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096 (networking-stable-18_10_16).\n- s390/cpum_sf: Add data entry sizes to sampling trailer entry (git-fixes).\n- s390/dasd: simplify locking in dasd_times_out (bsc#1104967,).\n- s390/kdump: Fix elfcorehdr size calculation (bsc#1117953, LTC#171112).\n- s390/kdump: Make elfcorehdr size calculation ABI compliant (bsc#1117953, LTC#171112).\n- s390/kvm: fix deadlock when killed by oom (bnc#1113501, LTC#172235).\n- s390/mm: Check for valid vma before zapping in gmap_discard (git-fixes).\n- s390/mm: correct allocate_pgste proc_handler callback (git-fixes).\n- s390: qeth_core_mpc: Use ARRAY_SIZE instead of reimplementing its function (bnc#1113501, LTC#172682).\n- s390/qeth: fix HiperSockets sniffer (bnc#1113501, LTC#172953).\n- s390/qeth: fix length check in SNMP processing (bsc#1117953, LTC#173657).\n- s390: qeth: Fix potential array overrun in cmd/rc lookup (bnc#1113501, LTC#172682).\n- s390/qeth: handle failure on workqueue creation (git-fixes).\n- s390/qeth: remove outdated portname debug msg (bsc#1117953, LTC#172960).\n- s390/qeth: report 25Gbit link speed (bnc#1113501, LTC#172959).\n- s390/qeth: sanitize strings in debug messages (bsc#1117953, LTC#172960).\n- s390: revert ELF_ET_DYN_BASE base changes (git-fixes).\n- s390/sclp_tty: enable line mode tty even if there is an ascii console (git-fixes).\n- s390/sthyi: add cache to store hypervisor info (LTC#160415, bsc#1068273).\n- s390/sthyi: add s390_sthyi system call (LTC#160415, bsc#1068273).\n- s390/sthyi: reorganize sthyi implementation (LTC#160415, bsc#1068273).\n- sbitmap: fix race in wait batch accounting (Git-fixes).\n- sched/core: Fix cpu.max vs. cpuhotplug deadlock (bsc#1106913).\n- sched/smt: Expose sched_smt_present static key (bsc#1106913).\n- sched/smt: Make sched_smt_present track topology (bsc#1106913).\n- sched, tracing: Fix trace_sched_pi_setprio() for deboosting (bsc#1120228).\n- scsi: core: Avoid that SCSI device removal through sysfs triggers a deadlock (bsc#1114578).\n- scsi: libsas: remove irq save in sas_ata_qc_issue() (bsc#1114580).\n- scsi: lpfc: add support to retrieve firmware logs (bsc#1114015).\n- scsi: lpfc: add Trunking support (bsc#1114015).\n- scsi: lpfc: Cap NPIV vports to 256 (bsc#1118215).\n- scsi: lpfc: Correct code setting non existent bits in sli4 ABORT WQE (bsc#1118215).\n- scsi: lpfc: Correct errors accessing fw log (bsc#1114015).\n- scsi: lpfc: Correct invalid EQ doorbell write on if_type=6 (bsc#1114015).\n- scsi: lpfc: Correct irq handling via locks when taking adapter offline (bsc#1114015).\n- scsi: lpfc: Correct LCB RJT handling (bsc#1114015).\n- scsi: lpfc: Correct loss of fc4 type on remote port address change (bsc#1114015).\n- scsi: lpfc: Correct race with abort on completion path (bsc#1114015).\n- scsi: lpfc: Correct soft lockup when running mds diagnostics (bsc#1114015).\n- scsi: lpfc: Correct speeds on SFP swap (bsc#1114015).\n- scsi: lpfc: Correct topology type reporting on G7 adapters (bsc#1118215).\n- scsi: lpfc: Defer LS_ACC to FLOGI on point to point logins (bsc#1118215).\n- scsi: lpfc: Enable Management features for IF_TYPE=6 (bsc#1119322).\n- scsi: lpfc: fcoe: Fix link down issue after 1000+ link bounces (bsc#1114015).\n- scsi: lpfc: Fix a duplicate 0711 log message number (bsc#1118215).\n- scsi: lpfc: fix block guard enablement on SLI3 adapters (bsc#1079935).\n- scsi: lpfc: Fix dif and first burst use in write commands (bsc#1118215).\n- scsi: lpfc: Fix discovery failures during port failovers with lots of vports (bsc#1118215).\n- scsi: lpfc: Fix driver release of fw-logging buffers (bsc#1118215).\n- scsi: lpfc: Fix errors in log messages (bsc#1114015).\n- scsi: lpfc: Fix GFT_ID and PRLI logic for RSCN (bsc#1114015).\n- scsi: lpfc: Fix kernel Oops due to null pring pointers (bsc#1118215).\n- scsi: lpfc: Fix LOGO/PLOGI handling when triggerd by ABTS Timeout event (bsc#1114015).\n- scsi: lpfc: Fix lpfc_sli4_read_config return value check (bsc#1114015).\n- scsi: lpfc: Fix odd recovery in duplicate FLOGIs in point-to-point (bsc#1114015).\n- scsi: lpfc: Fix panic when FW-log buffsize is not initialized (bsc#1118215).\n- scsi: lpfc: Implement GID_PT on Nameserver query to support faster failover (bsc#1114015).\n- scsi: lpfc: ls_rjt erroneus FLOGIs (bsc#1118215).\n- scsi: lpfc: Raise nvme defaults to support a larger io and more connectivity (bsc#1114015).\n- scsi: lpfc: raise sg count for nvme to use available sg resources (bsc#1114015).\n- scsi: lpfc: reduce locking when updating statistics (bsc#1114015).\n- scsi: lpfc: refactor mailbox structure context fields (bsc#1118215).\n- scsi: lpfc: Remove set but not used variable 'sgl_size' (bsc#1114015).\n- scsi: lpfc: Reset link or adapter instead of doing infinite nameserver PLOGI retry (bsc#1114015).\n- scsi: lpfc: rport port swap discovery issue (bsc#1118215).\n- scsi: lpfc: Synchronize access to remoteport via rport (bsc#1114015).\n- scsi: lpfc: update driver version to 12.0.0.7 (bsc#1114015).\n- scsi: lpfc: update driver version to 12.0.0.8 (bsc#1114015).\n- scsi: lpfc: update driver version to 12.0.0.9 (bsc#1118215).\n- scsi: lpfc: update manufacturer attribute to reflect Broadcom (bsc#1118215).\n- scsi: qlogicpti: Fix an error handling path in 'qpti_sbus_probe()' (bsc#1114581).\n- scsi: scsi_transport_srp: Fix shost to rport translation (bsc#1114582).\n- scsi: sg: fix minor memory leak in error path (bsc#1114584).\n- scsi: sysfs: Introduce sysfs_{un,}break_active_protection() (bsc#1114578).\n- scsi: target: add emulate_pr backstore attr to toggle PR support (bsc#1091405).\n- scsi: target: drop unused pi_prot_format attribute storage (bsc#1091405).\n- scsi: target: Fix fortify_panic kernel exception (bsc#1114576).\n- scsi: target/tcm_loop: Avoid that static checkers warn about dead code (bsc#1114577).\n- scsi: target: tcmu: add read length support (bsc#1097755).\n- scsi: zfcp: fix posting too many status read buffers leading to adapter shutdown (bsc#1121483, LTC#174588).\n- sctp: fix race on sctp_id2asoc (networking-stable-18_11_02).\n- sctp: fix strchange_flags name for Stream Change Event (networking-stable-18_11_21).\n- sctp: hold transport before accessing its asoc in sctp_transport_get_next (networking-stable-18_09_11).\n- sctp: not allow to set asoc prsctp_enable by sockopt (networking-stable-18_11_21).\n- sctp: not increase stream's incnt before sending addstrm_in request (networking-stable-18_11_21).\n- sctp: update dst pmtu with the correct daddr (networking-stable-18_10_16).\n- serial: 8250: Fix clearing FIFOs in RS485 mode again (bsc#1051510).\n- shmem: introduce shmem_inode_acct_block (VM Functionality, bsc#1121599).\n- shmem: shmem_charge: verify max_block is not exceeded before inode update (VM Functionality, bsc#1121599).\n- skd: Avoid that module unloading triggers a use-after-free (Git-fixes).\n- skd: Submit requests to firmware before triggering the doorbell (Git-fixes).\n- skip LAYOUTRETURN if layout is invalid (git-fixes).\n- soc: bcm2835: sync firmware properties with downstream ()\n- soc: fsl: qbman: qman: avoid allocating from non existing gen_pool (bsc#1051510).\n- soc/tegra: pmc: Fix child-node lookup (bsc#1051510).\n- soc: ti: QMSS: Fix usage of irq_set_affinity_hint (bsc#1051510).\n- spi: bcm2835: Avoid finishing transfer prematurely in IRQ mode (bsc#1051510).\n- spi: bcm2835: Fix book-keeping of DMA termination (bsc#1051510).\n- spi: bcm2835: Fix race on DMA termination (bsc#1051510).\n- spi: bcm2835: Unbreak the build of esoteric configs (bsc#1051510).\n- spi/bcm63xx-hsspi: keep pll clk enabled (bsc#1051510).\n- spi: bcm-qspi: switch back to reading flash using smaller chunks (bsc#1051510).\n- spi: sh-msiof: fix deferred probing (bsc#1051510).\n- splice: do not read more than available pipe space (bsc#1119212).\n- staging: bcm2835-camera: Abort probe if there is no camera (bsc#1051510).\n- staging: comedi: ni_mio_common: protect register write overflow (bsc#1051510).\n- staging:iio:ad7606: fix voltage scales (bsc#1051510).\n- staging: rtl8712: Fix possible buffer overrun (bsc#1051510).\n- staging: rtl8723bs: Add missing return for cfg80211_rtw_get_station (bsc#1051510).\n- staging: rtl8723bs: Fix the return value in case of error in 'rtw_wx_read32()' (bsc#1051510).\n- staging: rts5208: fix gcc-8 logic error warning (bsc#1051510).\n- staging: vchiq_arm: fix compat VCHIQ_IOC_AWAIT_COMPLETION (bsc#1051510).\n- staging: wilc1000: fix missing read_write setting when reading data (bsc#1051510).\n- sunrpc: Allow connect to return EHOSTUNREACH (git-fixes).\n- sunrpc: Do not use stack buffer with scatterlist (git-fixes).\n- sunrpc: Fix rpc_task_begin trace point (git-fixes).\n- sunrpc: Fix tracepoint storage issues with svc_recv and svc_rqst_status (git-fixes).\n- supported.conf: add raspberrypi-ts driver\n- supported.conf: whitelist bluefield eMMC driver\n- target: fix buffer offset in core_scsi3_pri_read_full_status (bsc1117349).\n- target/iscsi: avoid NULL dereference in CHAP auth error path (bsc#1117165).\n- target: se_dev_attrib.emulate_pr ABI stability (bsc#1091405).\n- tcp: do not restart timewait timer on rst reception (networking-stable-18_09_11).\n- team: no need to do team_notify_peers or team_mcast_rejoin when disabling port (bsc#1051510).\n- termios, tty/tty_baudrate.c: fix buffer overrun (bsc#1051510).\n- test_firmware: fix error return getting clobbered (bsc#1051510).\n- test_hexdump: use memcpy instead of strncpy (bsc#1051510).\n- tg3: Add PHY reset for 5717/5719/5720 in change ring and flow control paths (networking-stable-18_11_21).\n- thermal: bcm2835: enable hwmon explicitly (bsc#1108468).\n- thermal: da9062/61: Prevent hardware access during system suspend (bsc#1051510).\n- thermal: rcar_thermal: Prevent hardware access during system suspend (bsc#1051510).\n- tipc: do not assume linear buffer when reading ancillary data (networking-stable-18_11_21).\n- tipc: fix a missing rhashtable_walk_exit() (networking-stable-18_09_11).\n- tipc: fix flow control accounting for implicit connect (networking-stable-18_10_16).\n- tmpfs: make lseek(SEEK_DATA/SEK_HOLE) return ENXIO with a negative offset (bsc#1051510).\n- tools build: fix # escaping in .cmd files for future Make (git-fixes).\n- tools: hv: fcopy: set 'error' in case an unknown operation was requested (git-fixes).\n- tools: hv: include string.h in hv_fcopy_daemon (git-fixes).\n- tools/lib/lockdep: Rename 'trywlock' into 'trywrlock' (bsc#1121973).\n- tools/power/cpupower: fix compilation with STATIC=true (git-fixes).\n- tools/power turbostat: fix possible sprintf buffer overflow (git-fixes).\n- tpm2-cmd: allow more attempts for selftest execution (bsc#1082555).\n- tpm: add retry logic (bsc#1082555).\n- tpm: consolidate the TPM startup code (bsc#1082555).\n- tpm: do not suspend/resume if power stays on (bsc#1082555).\n- tpm: fix intermittent failure with self tests (bsc#1082555).\n- tpm: fix response size validation in tpm_get_random() (bsc#1082555).\n- tpm: move endianness conversion of ordinals to tpm_input_header (bsc#1082555).\n- tpm: move endianness conversion of TPM_TAG_RQU_COMMAND to tpm_input_header (bsc#1082555).\n- tpm: move the delay_msec increment after sleep in tpm_transmit() (bsc#1082555).\n- tpm: React correctly to RC_TESTING from TPM 2.0 self tests (bsc#1082555).\n- tpm: replace msleep() with usleep_range() in TPM 1.2/2.0 generic drivers (bsc#1082555).\n- tpm: Restore functionality to xen vtpm driver (bsc#1082555).\n- tpm: self test failure should not cause suspend to fail (bsc#1082555).\n- tpm: tpm-interface: fix tpm_transmit/_cmd kdoc (bsc#1082555).\n- tpm: Trigger only missing TPM 2.0 self tests (bsc#1082555).\n- tpm: Use dynamic delay to wait for TPM 2.0 self test result (bsc#1082555).\n- tpm: use tpm2_pcr_read() in tpm2_do_selftest() (bsc#1082555).\n- tpm: use tpm_buf functions in tpm2_pcr_read() (bsc#1082555).\n- tracing: Apply trace_clock changes to instance max buffer (bsc#1117188).\n- tracing/blktrace: Fix to allow setting same value (Git-fixes).\n- tracing: Erase irqsoff trace with empty write (bsc#1117189).\n- tracing: Fix bad use of igrab in trace_uprobe.c (bsc#1120046).\n- tracing: Fix crash when freeing instances with event triggers (bsc#1120230).\n- tracing: Fix crash when it fails to alloc ring buffer (bsc#1120097).\n- tracing: Fix double free of event_trigger_data (bsc#1120234).\n- tracing: Fix missing return symbol in function_graph output (bsc#1120232).\n- tracing: Fix possible double free in event_enable_trigger_func() (bsc#1120235).\n- tracing: Fix possible double free on failure of allocating trace buffer (bsc#1120214).\n- tracing: Fix regex_match_front() to not over compare the test string (bsc#1120223).\n- tracing: Fix trace_pipe behavior for instance traces (bsc#1120088).\n- tracing: Remove RCU work arounds from stack tracer (bsc#1120092).\n- tracing/samples: Fix creation and deletion of simple_thread_fn creation (git-fixes).\n- tty: check name length in tty_find_polling_driver() (bsc#1051510).\n- tty: Do not block on IO when ldisc change is pending (bnc#1105428).\n- tty: Do not hold ldisc lock in tty_reopen() if ldisc present (bsc#1051510).\n- tty: Do not return -EAGAIN in blocking read (bsc#1116040).\n- tty: do not set TTY_IO_ERROR flag if console port (bsc#1051510).\n- tty: fix data race between tty_init_dev and flush of buf (bnc#1105428).\n- tty: Hold tty_ldisc_lock() during tty_reopen() (bnc#1105428).\n- tty/ldsem: Add lockdep asserts for ldisc_sem (bnc#1105428).\n- tty/ldsem: Convert to regular lockdep annotations (bnc#1105428).\n- tty/ldsem: Decrement wait_readers on timeouted down_read() (bnc#1105428).\n- tty/ldsem: Wake up readers after timed out down_write() (bnc#1105428).\n- tty: serial: 8250_mtk: always resume the device in probe (bsc#1051510).\n- tty: Simplify tty->count math in tty_reopen() (bnc#1105428).\n- tty: wipe buffer (bsc#1051510).\n- tty: wipe buffer if not echoing data (bsc#1051510).\n- tun: Consistently configure generic netdev params via rtnetlink (bsc#1051510).\n- tuntap: fix multiqueue rx (networking-stable-18_11_21).\n- ubifs: Handle re-linking of inodes correctly while recovery (bsc#1120598).\n- ubifs-Handle-re-linking-of-inodes-correctly-while-re.patch: Fixup compilation failure due to different ubifs_assert() prototype.\n- udf: Allow mounting volumes with incorrect identification strings (bsc#1118774).\n- udp4: fix IP_CMSG_CHECKSUM for connected sockets (networking-stable-18_09_24).\n- udp6: add missing checks on edumux packet processing (networking-stable-18_09_24).\n- udp6: fix encap return code for resubmitting (git-fixes).\n- uio: ensure class is registered before devices (bsc#1051510).\n- uio: Fix an Oops on load (bsc#1051510).\n- uio: make symbol 'uio_class_registered' static (bsc#1051510).\n- unifdef: use memcpy instead of strncpy (bsc#1051510).\n- usb: appledisplay: Add 27' Apple Cinema Display (bsc#1051510).\n- usb: cdc-acm: add entry for Hiro (Conexant) modem (bsc#1051510).\n- usb: chipidea: Prevent unbalanced IRQ disable (bsc#1051510).\n- usb: core: Fix hub port connection events lost (bsc#1051510).\n- usb: core: quirks: add RESET_RESUME quirk for Cherry G230 Stream series (bsc#1051510).\n- usb: dwc2: host: do not delay retries for CONTROL IN transfers (bsc#1114385).\n- usb: dwc2: host: Do not retry NAKed transactions right away (bsc#1114385).\n- usb: dwc2: host: use hrtimer for NAK retries (git-fixes).\n- usb: dwc3: core: Clean up ULPI device (bsc#1051510).\n- usb: dwc3: gadget: fix ISOC TRB type on unaligned transfers (bsc#1051510).\n- usb: dwc3: gadget: Properly check last unaligned/zero chain TRB (bsc#1051510).\n- usb: gadget: fsl_udc_core: check allocation return value and cleanup on failure (bsc#1051510).\n- usb: gadget: fsl_udc_core: fixup struct_udc_setup documentation (bsc#1051510).\n- usb: gadget: storage: Fix Spectre v1 vulnerability (bsc#1051510).\n- usb: gadget: udc: atmel: handle at91sam9rl PMC (bsc#1051510).\n- usb: gadget: u_ether: fix unsafe list iteration (bsc#1051510).\n- usb: host: ohci-at91: fix request of irq for optional gpio (bsc#1051510).\n- usb: hso: Fix OOB memory access in hso_probe/hso_get_config_data (bsc#1051510).\n- usbip: tools: fix atoi() on non-null terminated string (bsc#1051510).\n- usbip: vhci_hcd: check rhport before using in vhci_hub_control() (bsc#1090888).\n- usbip:vudc: BUG kmalloc-2048 (Not tainted): Poison overwritten (bsc#1051510).\n- usb: misc: appledisplay: add 20' Apple Cinema Display (bsc#1051510).\n- usbnet: smsc95xx: disable carrier check while suspending (bsc#1051510).\n- usb: omap_udc: fix crashes on probe error and module removal (bsc#1051510).\n- usb: omap_udc: fix omap_udc_start() on 15xx machines (bsc#1051510).\n- usb: omap_udc: fix rejection of out transfers when DMA is used (bsc#1051510).\n- usb: omap_udc: fix USB gadget functionality on Palm Tungsten E (bsc#1051510).\n- usb: omap_udc: use devm_request_irq() (bsc#1051510).\n- usb: quirk: add no-LPM quirk on SanDisk Ultra Flair device (bsc#1051510).\n- usb: quirks: Add delay-init quirk for Corsair K70 LUX RGB (bsc#1051510).\n- usb: quirks: Add no-lpm quirk for Raydium touchscreens (bsc#1051510).\n- usb: serial: cypress_m8: fix interrupt-out transfer length (bsc#1051510).\n- usb: serial: option: add Fibocom NL668 series (bsc#1051510).\n- usb: serial: option: add GosunCn ZTE WeLink ME3630 (bsc#1051510).\n- usb: serial: option: add HP lt4132 (bsc#1051510).\n- usb: serial: option: add Simcom SIM7500/SIM7600 (MBIM mode) (bsc#1051510).\n- usb: serial: option: add Telit LN940 series (bsc#1051510).\n- usb: serial: option: add two-endpoints device-id flag (bsc#1051510).\n- usb: serial: option: drop redundant interface-class test (bsc#1051510).\n- usb: serial: option: improve Quectel EP06 detection (bsc#1051510).\n- usb: usbip: Fix BUG: KASAN: slab-out-of-bounds in vhci_hub_control() (bsc#1106110).\n- usb: usb-storage: Add new IDs to ums-realtek (bsc#1051510).\n- usb: xhci: fix timeout for transition from RExit to U0 (bsc#1051510).\n- usb: xhci: fix uninitialized completion when USB3 port got wrong status (bsc#1051510).\n- usb: xhci: Prevent bus suspend if a port connect change or polling state is detected (bsc#1051510).\n- userfaultfd: clear the vma->vm_userfaultfd_ctx if UFFD_EVENT_FORK fails (bsc#1118761).\n- userfaultfd: remove uffd flags from vma->vm_flags if UFFD_EVENT_FORK fails (bsc#1118809).\n- v9fs_dir_readdir: fix double-free on p9stat_read error (bsc#1118771).\n- vfs: Avoid softlockups in drop_pagecache_sb() (bsc#1118505).\n- vfs: close race between getcwd() and d_move() (git-fixes).\n- vfs: fix freeze protection in mnt_want_write_file() for overlayfs (git-fixes).\n- vhost: Fix Spectre V1 vulnerability (bsc#1051510).\n- vhost/scsi: truncate T10 PI iov_iter to prot_bytes (bsc#1051510).\n- virtio_net: avoid using netif_tx_disable() for serializing tx routine (networking-stable-18_11_02).\n- VMCI: Resource wildcard match fixed (bsc#1051510).\n- w1: omap-hdq: fix missing bus unregister at removal (bsc#1051510).\n- watchdog/core: Add missing prototypes for weak functions (git-fixes).\n- wireless: airo: potential buffer overflow in sprintf() (bsc#1051510).\n- wlcore: Fix the return value in case of error in 'wlcore_vendor_cmd_smart_config_start()' (bsc#1051510).\n- Workaround for mysterious NVMe breakage with i915 CFL (bsc#1111040).\n- x86/boot/KASLR: Work around firmware bugs by excluding EFI_BOOT_SERVICES_* and EFI_LOADER_* from KASLR's choice (bnc#1112878).\n- x86/bugs: Add AMD's SPEC_CTRL MSR usage (bsc#1106913).\n- x86/bugs: Fix the AMD SSBD usage of the SPEC_CTRL MSR (bsc#1106913).\n- x86/bugs: Switch the selection of mitigation from CPU vendor to CPU features (bsc#1106913).\n- x86/corruption-check: Fix panic in memory_corruption_check() when boot option without value is provided (bsc#1110006).\n- x86/cpu/vmware: Do not trace vmware_sched_clock() (bsc#1114279).\n- x86/decoder: Fix and update the opcodes map (bsc#1058115).\n- x86, hibernate: Fix nosave_regions setup for hibernation (bsc#1110006).\n- x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772).\n- x86/kabi: Fix cpu_tlbstate issue (bsc#1106913).\n- x86/kexec: Correct KEXEC_BACKUP_SRC_END off-by-one error (bsc#1114279).\n- x86/l1tf: Show actual SMT state (bsc#1106913).\n- x86/ldt: Remove unused variable in map_ldt_struct() (bsc#1114279).\n- x86/ldt: Split out sanity check in map_ldt_struct() (bsc#1114279).\n- x86/ldt: Unmap PTEs for the slot before freeing LDT pages (bsc#1114279).\n- x86/MCE/AMD: Fix the thresholding machinery initialization order (bsc#1114279).\n- x86/MCE: Make correctable error detection look at the Deferred bit (bsc#1114279).\n- x86/mm: Fix decoy address handling vs 32-bit builds (bsc#1120606).\n- x86/mm/pat: Disable preemption around __flush_tlb_all() (bsc#1114279).\n- x86/PCI: Add additional VMD device root ports to VMD AER quirk (bsc#1120058).\n- x86/PCI: Add 'pci=big_root_window' option for AMD 64-bit windows (bsc#1120058).\n- x86/PCI: Apply VMD's AERSID fixup generically (bsc#1120058).\n- x86/PCI: Avoid AMD SB7xx EHCI USB wakeup defect (bsc#1120058).\n- x86/PCI: Enable a 64bit BAR on AMD Family 15h (Models 00-1f, 30-3f, 60-7f) (bsc#1120058).\n- x86/PCI: Enable AMD 64-bit window on resume (bsc#1120058).\n- x86/PCI: Fix infinite loop in search for 64bit BAR placement (bsc#1120058).\n- x86/PCI: Move and shrink AMD 64-bit window to avoid conflict (bsc#1120058).\n- x86/PCI: Move VMD quirk to x86 fixups (bsc#1120058).\n- x86/PCI: Only enable a 64bit BAR on single-socket AMD Family 15h (bsc#1120058).\n- x86/PCI: Use is_vmd() rather than relying on the domain number (bsc#1120058).\n- x86/process: Consolidate and simplify switch_to_xtra() code (bsc#1106913).\n- x86/pti: Document fix wrong index (git-fixes).\n- x86/retpoline: Make CONFIG_RETPOLINE depend on compiler support (bsc#1106913).\n- x86/retpoline: Remove minimal retpoline support (bsc#1106913).\n- x86/speculataion: Mark command line parser data __initdata (bsc#1106913).\n- x86/speculation: Add command line control for indirect branch speculation (bsc#1106913).\n- x86/speculation: Add prctl() control for indirect branch speculation (bsc#1106913).\n- x86/speculation: Add seccomp Spectre v2 user space protection mode (bsc#1106913).\n- x86/speculation: Apply IBPB more strictly to avoid cross-process data leak (bsc#1106913).\n- x86/speculation: Avoid __switch_to_xtra() calls (bsc#1106913).\n- x86/speculation: Clean up spectre_v2_parse_cmdline() (bsc#1106913).\n- x86/speculation: Disable STIBP when enhanced IBRS is in use (bsc#1106913).\n- x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation (bsc#1106913).\n- x86/speculation: Enable prctl mode for spectre_v2_user (bsc#1106913).\n- x86/speculation/l1tf: Drop the swap storage limit restriction when l1tf=off (bnc#1114871).\n- x86/speculation: Mark string arrays const correctly (bsc#1106913).\n- x86/speculation: Move STIPB/IBPB string conditionals out of cpu_show_common() (bsc#1106913).\n- x86/speculation: Prepare arch_smt_update() for PRCTL mode (bsc#1106913).\n- x86/speculation: Prepare for conditional IBPB in switch_mm() (bsc#1106913).\n- x86/speculation: Prepare for per task indirect branch speculation control (bsc#1106913).\n- x86/speculation: Prevent stale SPEC_CTRL msr content (bsc#1106913).\n- x86/speculation: Propagate information about RSB filling mitigation to sysfs (bsc#1106913).\n- x86/speculation: Provide IBPB always command line options (bsc#1106913).\n- x86/speculation: Remove unnecessary ret variable in cpu_show_common() (bsc#1106913).\n- x86/speculation: Rename SSBD update functions (bsc#1106913).\n- x86/speculation: Reorder the spec_v2 code (bsc#1106913).\n- x86/speculation: Reorganize speculation control MSRs update (bsc#1106913).\n- x86/speculation: Rework SMT state change (bsc#1106913).\n- x86/speculation: Split out TIF update (bsc#1106913).\n- x86/speculation: Support Enhanced IBRS on future CPUs ().\n- x86/speculation: Unify conditional spectre v2 print functions (bsc#1106913).\n- x86/speculation: Update the TIF_SSBD comment (bsc#1106913).\n- x86/xen: Fix boot loader version reported for PVH guests (bnc#1065600).\n- xen/balloon: Support xend-based toolstack (bnc#1065600).\n- xen/blkfront: avoid NULL blkfront_info dereference on device removal (bsc#1111062).\n- xen: fix race in xen_qlock_wait() (bnc#1107256).\n- xen: fix xen_qlock_wait() (bnc#1107256).\n- xen: make xen_qlock_wait() nestable (bnc#1107256).\n- xen/netfront: do not bug in case of too many frags (bnc#1104824).\n- xen/netfront: tolerate frags with no data (bnc#1119804).\n- xen/pvh: do not try to unplug emulated devices (bnc#1065600).\n- xen/pvh: increase early stack size (bnc#1065600).\n- xen-swiotlb: use actually allocated size on check physical continuous (bnc#1065600).\n- xen/x86: add diagnostic printout to xen_mc_flush() in case of error (bnc#1116183).\n- xfs: Align compat attrlist_by_handle with native implementation (git-fixes).\n- xfs: Fix error code in 'xfs_ioc_getbmap()' (git-fixes).\n- xfs: fix quotacheck dquot id overflow infinite loop (bsc#1121621).\n- xfs: Fix xqmstats offsets in /proc/fs/xfs/xqmstat (git-fixes).\n- xfs: Properly detect when DAX won't be used on any device (bsc#1115976).\n- xfs: xfs_buf: drop useless LIST_HEAD (git-fixes).\n- xhci: Add check for invalid byte size error when UAS devices are connected (bsc#1051510).\n- xhci: Add quirk to workaround the errata seen on Cavium Thunder-X2 Soc (bsc#1117162).\n- xhci: Do not prevent USB2 bus suspend in state check intended for USB3 only (bsc#1051510).\n- xhci: Fix leaking USB3 shared_hcd at xhci removal (bsc#1051510).\n- xhci: Prevent U1/U2 link pm states if exit latency is too long (bsc#1051510).\n- xprtrdma: Do not defer fencing an async RPC's chunks (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-224,SUSE-SLE-Module-Basesystem-15-2019-224,SUSE-SLE-Module-Development-Tools-15-2019-224,SUSE-SLE-Module-Development-Tools-OBS-15-2019-224,SUSE-SLE-Module-Legacy-15-2019-224,SUSE-SLE-Module-Live-Patching-15-2019-224,SUSE-SLE-Product-HA-15-2019-224,SUSE-SLE-Product-WE-15-2019-224", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0224-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:0224-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20190224-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:0224-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html", }, { category: "self", summary: "SUSE Bug 1024718", url: "https://bugzilla.suse.com/1024718", }, { category: "self", summary: "SUSE Bug 1046299", url: "https://bugzilla.suse.com/1046299", }, { category: "self", summary: "SUSE Bug 1050242", url: "https://bugzilla.suse.com/1050242", }, { category: "self", summary: "SUSE Bug 1050244", url: "https://bugzilla.suse.com/1050244", }, { category: "self", summary: "SUSE Bug 1051510", url: "https://bugzilla.suse.com/1051510", }, { category: "self", summary: "SUSE Bug 1055120", url: "https://bugzilla.suse.com/1055120", }, { category: "self", summary: "SUSE Bug 1055121", url: "https://bugzilla.suse.com/1055121", }, { category: "self", summary: "SUSE Bug 1055186", url: "https://bugzilla.suse.com/1055186", }, { category: "self", summary: "SUSE Bug 1058115", url: "https://bugzilla.suse.com/1058115", }, { category: "self", summary: "SUSE Bug 1060463", url: "https://bugzilla.suse.com/1060463", }, { category: "self", summary: "SUSE Bug 1061840", url: "https://bugzilla.suse.com/1061840", }, { category: "self", summary: "SUSE Bug 1065600", url: "https://bugzilla.suse.com/1065600", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1068273", url: "https://bugzilla.suse.com/1068273", }, { category: "self", summary: "SUSE Bug 1078248", url: "https://bugzilla.suse.com/1078248", }, { category: "self", summary: "SUSE Bug 1079935", url: "https://bugzilla.suse.com/1079935", }, { category: "self", summary: "SUSE Bug 1082387", url: "https://bugzilla.suse.com/1082387", }, { category: "self", summary: "SUSE Bug 1082555", url: "https://bugzilla.suse.com/1082555", }, { category: "self", summary: "SUSE Bug 1082653", url: "https://bugzilla.suse.com/1082653", }, { category: "self", summary: "SUSE Bug 1083647", url: "https://bugzilla.suse.com/1083647", }, { category: "self", summary: "SUSE Bug 1085535", url: "https://bugzilla.suse.com/1085535", }, { category: "self", summary: "SUSE Bug 1086196", url: "https://bugzilla.suse.com/1086196", }, { category: "self", summary: "SUSE Bug 1086282", url: "https://bugzilla.suse.com/1086282", }, { category: "self", summary: "SUSE Bug 1086283", url: "https://bugzilla.suse.com/1086283", }, { category: "self", summary: "SUSE Bug 1086423", url: "https://bugzilla.suse.com/1086423", }, { category: "self", summary: "SUSE Bug 1087978", url: "https://bugzilla.suse.com/1087978", }, { category: "self", summary: "SUSE Bug 1088386", url: "https://bugzilla.suse.com/1088386", }, { category: "self", summary: "SUSE Bug 1089350", url: "https://bugzilla.suse.com/1089350", }, { category: "self", summary: "SUSE Bug 1090888", url: "https://bugzilla.suse.com/1090888", }, { category: "self", summary: "SUSE Bug 1091405", url: "https://bugzilla.suse.com/1091405", }, { category: "self", summary: "SUSE Bug 1091800", url: "https://bugzilla.suse.com/1091800", }, { category: "self", summary: "SUSE Bug 1094244", url: "https://bugzilla.suse.com/1094244", }, { category: "self", summary: "SUSE Bug 1097593", url: "https://bugzilla.suse.com/1097593", }, { category: "self", summary: "SUSE Bug 1097755", url: "https://bugzilla.suse.com/1097755", }, { category: "self", summary: "SUSE Bug 1100132", url: "https://bugzilla.suse.com/1100132", }, { category: "self", summary: "SUSE Bug 1102875", url: "https://bugzilla.suse.com/1102875", }, { category: "self", summary: "SUSE Bug 1102877", url: "https://bugzilla.suse.com/1102877", }, { category: "self", summary: "SUSE Bug 1102879", url: "https://bugzilla.suse.com/1102879", }, { category: "self", summary: "SUSE Bug 1102882", url: "https://bugzilla.suse.com/1102882", }, { category: "self", summary: "SUSE Bug 1102896", url: "https://bugzilla.suse.com/1102896", }, { category: "self", summary: "SUSE Bug 1103257", url: "https://bugzilla.suse.com/1103257", }, { category: "self", summary: "SUSE Bug 1103356", url: "https://bugzilla.suse.com/1103356", }, { category: "self", summary: "SUSE Bug 1103925", url: "https://bugzilla.suse.com/1103925", }, { category: "self", summary: "SUSE Bug 1104124", url: "https://bugzilla.suse.com/1104124", }, { category: "self", summary: "SUSE Bug 1104353", url: "https://bugzilla.suse.com/1104353", }, { category: "self", summary: "SUSE Bug 1104427", url: "https://bugzilla.suse.com/1104427", }, { category: "self", summary: "SUSE Bug 1104824", url: "https://bugzilla.suse.com/1104824", }, { category: "self", summary: "SUSE Bug 1104967", url: "https://bugzilla.suse.com/1104967", }, { category: "self", summary: "SUSE Bug 1105168", url: "https://bugzilla.suse.com/1105168", }, { category: "self", summary: "SUSE Bug 1105428", url: "https://bugzilla.suse.com/1105428", }, { category: "self", summary: "SUSE Bug 1106105", url: "https://bugzilla.suse.com/1106105", }, { category: "self", summary: "SUSE Bug 1106110", url: "https://bugzilla.suse.com/1106110", }, { category: "self", summary: "SUSE Bug 1106237", url: "https://bugzilla.suse.com/1106237", }, { category: "self", summary: "SUSE Bug 1106240", url: "https://bugzilla.suse.com/1106240", }, { category: "self", summary: "SUSE Bug 1106615", url: "https://bugzilla.suse.com/1106615", }, { category: "self", summary: "SUSE Bug 1106913", url: "https://bugzilla.suse.com/1106913", }, { category: "self", summary: "SUSE Bug 1107256", url: "https://bugzilla.suse.com/1107256", }, { category: "self", summary: "SUSE Bug 1107385", url: "https://bugzilla.suse.com/1107385", }, { category: "self", summary: "SUSE Bug 1107866", url: "https://bugzilla.suse.com/1107866", }, { category: "self", summary: "SUSE Bug 1108270", url: "https://bugzilla.suse.com/1108270", }, { category: "self", summary: "SUSE Bug 1108468", url: "https://bugzilla.suse.com/1108468", }, { category: "self", summary: "SUSE Bug 1109272", url: "https://bugzilla.suse.com/1109272", }, { category: "self", summary: "SUSE Bug 1109772", url: "https://bugzilla.suse.com/1109772", }, { category: "self", summary: "SUSE Bug 1109806", url: "https://bugzilla.suse.com/1109806", }, { category: "self", summary: "SUSE Bug 1110006", url: "https://bugzilla.suse.com/1110006", }, { category: "self", summary: "SUSE Bug 1110558", url: "https://bugzilla.suse.com/1110558", }, { category: "self", summary: "SUSE Bug 1110998", url: "https://bugzilla.suse.com/1110998", }, { category: "self", summary: "SUSE Bug 1111040", url: "https://bugzilla.suse.com/1111040", }, { category: "self", summary: "SUSE Bug 1111062", url: "https://bugzilla.suse.com/1111062", }, { category: "self", summary: "SUSE Bug 1111174", url: "https://bugzilla.suse.com/1111174", }, { category: "self", summary: "SUSE Bug 1111183", url: "https://bugzilla.suse.com/1111183", }, { category: "self", summary: "SUSE Bug 1111188", url: "https://bugzilla.suse.com/1111188", }, { category: "self", summary: "SUSE Bug 1111469", url: "https://bugzilla.suse.com/1111469", }, { category: "self", summary: "SUSE Bug 1111696", url: "https://bugzilla.suse.com/1111696", }, { category: "self", summary: "SUSE Bug 1111795", url: "https://bugzilla.suse.com/1111795", }, { category: "self", summary: "SUSE Bug 1111809", url: "https://bugzilla.suse.com/1111809", }, { category: "self", summary: "SUSE Bug 1111921", url: "https://bugzilla.suse.com/1111921", }, { category: "self", summary: "SUSE Bug 1112878", url: "https://bugzilla.suse.com/1112878", }, { category: "self", summary: "SUSE Bug 1112963", url: "https://bugzilla.suse.com/1112963", }, { category: "self", summary: "SUSE Bug 1113295", url: "https://bugzilla.suse.com/1113295", }, { category: "self", summary: "SUSE Bug 1113408", url: "https://bugzilla.suse.com/1113408", }, { category: "self", summary: "SUSE Bug 1113412", url: "https://bugzilla.suse.com/1113412", }, { category: "self", summary: "SUSE Bug 1113501", url: "https://bugzilla.suse.com/1113501", }, { category: "self", summary: "SUSE Bug 1113667", url: "https://bugzilla.suse.com/1113667", }, { category: "self", summary: "SUSE Bug 1113677", url: "https://bugzilla.suse.com/1113677", }, { category: "self", summary: "SUSE Bug 1113722", url: "https://bugzilla.suse.com/1113722", }, { category: "self", summary: "SUSE Bug 1113751", url: "https://bugzilla.suse.com/1113751", }, { category: "self", summary: "SUSE Bug 1113769", url: "https://bugzilla.suse.com/1113769", }, { category: "self", summary: "SUSE Bug 1113780", url: "https://bugzilla.suse.com/1113780", }, { category: "self", summary: "SUSE Bug 1113972", url: "https://bugzilla.suse.com/1113972", }, { category: "self", summary: "SUSE Bug 1114015", url: "https://bugzilla.suse.com/1114015", }, { category: "self", summary: "SUSE Bug 1114178", url: "https://bugzilla.suse.com/1114178", }, { category: "self", summary: "SUSE Bug 1114279", url: "https://bugzilla.suse.com/1114279", }, { category: "self", summary: "SUSE Bug 1114385", url: "https://bugzilla.suse.com/1114385", }, { category: "self", summary: "SUSE Bug 1114576", url: "https://bugzilla.suse.com/1114576", }, { category: "self", summary: "SUSE Bug 1114577", url: "https://bugzilla.suse.com/1114577", }, { category: "self", summary: "SUSE Bug 1114578", url: "https://bugzilla.suse.com/1114578", }, { category: "self", summary: "SUSE Bug 1114579", url: "https://bugzilla.suse.com/1114579", }, { category: "self", summary: "SUSE Bug 1114580", url: "https://bugzilla.suse.com/1114580", }, { category: "self", summary: "SUSE Bug 1114581", url: "https://bugzilla.suse.com/1114581", }, { category: "self", summary: "SUSE Bug 1114582", url: "https://bugzilla.suse.com/1114582", }, { category: "self", summary: "SUSE Bug 1114583", url: "https://bugzilla.suse.com/1114583", }, { category: "self", summary: "SUSE Bug 1114584", url: "https://bugzilla.suse.com/1114584", }, { category: "self", summary: "SUSE Bug 1114585", url: "https://bugzilla.suse.com/1114585", }, { category: "self", summary: "SUSE Bug 1114839", url: "https://bugzilla.suse.com/1114839", }, { category: "self", summary: "SUSE Bug 1114871", url: "https://bugzilla.suse.com/1114871", }, { category: "self", summary: "SUSE Bug 1115074", url: "https://bugzilla.suse.com/1115074", }, { category: "self", summary: "SUSE Bug 1115269", url: "https://bugzilla.suse.com/1115269", }, { category: "self", summary: "SUSE Bug 1115431", url: "https://bugzilla.suse.com/1115431", }, { category: "self", summary: "SUSE Bug 1115433", url: "https://bugzilla.suse.com/1115433", }, { category: "self", summary: "SUSE Bug 1115440", url: "https://bugzilla.suse.com/1115440", }, { category: "self", summary: "SUSE Bug 1115567", url: "https://bugzilla.suse.com/1115567", }, { category: "self", summary: "SUSE Bug 1115709", url: "https://bugzilla.suse.com/1115709", }, { category: "self", summary: "SUSE Bug 1115976", url: "https://bugzilla.suse.com/1115976", }, { category: "self", summary: "SUSE Bug 1116040", url: "https://bugzilla.suse.com/1116040", }, { category: "self", summary: "SUSE Bug 1116183", url: "https://bugzilla.suse.com/1116183", }, { category: "self", summary: "SUSE Bug 1116336", url: "https://bugzilla.suse.com/1116336", }, { category: "self", summary: "SUSE Bug 1116692", url: "https://bugzilla.suse.com/1116692", }, { category: "self", summary: "SUSE Bug 1116693", url: "https://bugzilla.suse.com/1116693", }, { category: "self", summary: "SUSE Bug 1116698", url: "https://bugzilla.suse.com/1116698", }, { category: "self", summary: "SUSE Bug 1116699", url: "https://bugzilla.suse.com/1116699", }, { category: "self", summary: "SUSE Bug 1116700", url: "https://bugzilla.suse.com/1116700", }, { category: "self", summary: "SUSE Bug 1116701", url: "https://bugzilla.suse.com/1116701", }, { category: "self", summary: "SUSE Bug 1116803", url: "https://bugzilla.suse.com/1116803", }, { category: "self", summary: "SUSE Bug 1116841", url: "https://bugzilla.suse.com/1116841", }, { category: "self", summary: "SUSE Bug 1116862", url: "https://bugzilla.suse.com/1116862", }, { category: "self", summary: "SUSE Bug 1116863", url: "https://bugzilla.suse.com/1116863", }, { category: "self", summary: "SUSE Bug 1116876", url: "https://bugzilla.suse.com/1116876", }, { category: "self", summary: "SUSE Bug 1116877", url: "https://bugzilla.suse.com/1116877", }, { category: "self", summary: "SUSE Bug 1116878", url: "https://bugzilla.suse.com/1116878", }, { category: "self", summary: "SUSE Bug 1116891", url: "https://bugzilla.suse.com/1116891", }, { category: "self", summary: "SUSE Bug 1116895", url: "https://bugzilla.suse.com/1116895", }, { category: "self", summary: "SUSE Bug 1116899", url: "https://bugzilla.suse.com/1116899", }, { category: "self", summary: "SUSE Bug 1116950", url: "https://bugzilla.suse.com/1116950", }, { category: "self", summary: "SUSE Bug 1117115", url: "https://bugzilla.suse.com/1117115", }, { category: "self", summary: "SUSE Bug 1117162", url: "https://bugzilla.suse.com/1117162", }, { category: "self", summary: "SUSE Bug 1117165", url: "https://bugzilla.suse.com/1117165", }, { category: "self", summary: "SUSE Bug 1117168", url: "https://bugzilla.suse.com/1117168", }, { category: "self", summary: "SUSE Bug 1117172", url: "https://bugzilla.suse.com/1117172", }, { category: "self", summary: "SUSE Bug 1117174", url: "https://bugzilla.suse.com/1117174", }, { category: "self", summary: "SUSE Bug 1117181", url: "https://bugzilla.suse.com/1117181", }, { category: "self", summary: "SUSE Bug 1117184", url: "https://bugzilla.suse.com/1117184", }, { category: "self", summary: "SUSE Bug 1117186", url: "https://bugzilla.suse.com/1117186", }, { category: "self", summary: "SUSE Bug 1117188", url: "https://bugzilla.suse.com/1117188", }, { category: "self", summary: "SUSE Bug 1117189", url: "https://bugzilla.suse.com/1117189", }, { category: "self", summary: "SUSE Bug 1117349", url: "https://bugzilla.suse.com/1117349", }, { category: "self", summary: "SUSE Bug 1117561", url: "https://bugzilla.suse.com/1117561", }, { category: "self", summary: "SUSE Bug 1117656", url: "https://bugzilla.suse.com/1117656", }, { category: "self", summary: "SUSE Bug 1117788", url: "https://bugzilla.suse.com/1117788", }, { category: "self", summary: "SUSE Bug 1117789", url: "https://bugzilla.suse.com/1117789", }, { category: "self", summary: "SUSE Bug 1117790", url: "https://bugzilla.suse.com/1117790", }, { category: "self", summary: "SUSE Bug 1117791", url: "https://bugzilla.suse.com/1117791", }, { category: "self", summary: "SUSE Bug 1117792", url: "https://bugzilla.suse.com/1117792", }, { category: "self", summary: "SUSE Bug 1117794", url: "https://bugzilla.suse.com/1117794", }, { category: "self", summary: "SUSE Bug 1117795", url: "https://bugzilla.suse.com/1117795", }, { category: "self", summary: "SUSE Bug 1117796", url: "https://bugzilla.suse.com/1117796", }, { category: "self", summary: "SUSE Bug 1117798", url: "https://bugzilla.suse.com/1117798", }, { category: "self", summary: "SUSE Bug 1117799", url: "https://bugzilla.suse.com/1117799", }, { category: "self", summary: "SUSE Bug 1117801", url: "https://bugzilla.suse.com/1117801", }, { category: "self", summary: "SUSE Bug 1117802", url: "https://bugzilla.suse.com/1117802", }, { category: "self", summary: "SUSE Bug 1117803", url: "https://bugzilla.suse.com/1117803", }, { category: "self", summary: "SUSE Bug 1117804", url: "https://bugzilla.suse.com/1117804", }, { category: "self", summary: "SUSE Bug 1117805", url: "https://bugzilla.suse.com/1117805", }, { category: "self", summary: "SUSE Bug 1117806", url: "https://bugzilla.suse.com/1117806", }, { category: "self", summary: "SUSE Bug 1117807", url: "https://bugzilla.suse.com/1117807", }, { category: "self", summary: "SUSE Bug 1117808", url: "https://bugzilla.suse.com/1117808", }, { category: "self", summary: "SUSE Bug 1117815", url: "https://bugzilla.suse.com/1117815", }, { category: "self", summary: "SUSE Bug 1117816", url: "https://bugzilla.suse.com/1117816", }, { category: "self", summary: "SUSE Bug 1117817", url: "https://bugzilla.suse.com/1117817", }, { category: "self", summary: "SUSE Bug 1117818", url: "https://bugzilla.suse.com/1117818", }, { category: "self", summary: "SUSE Bug 1117819", url: "https://bugzilla.suse.com/1117819", }, { category: "self", summary: "SUSE Bug 1117820", url: "https://bugzilla.suse.com/1117820", }, { category: "self", summary: "SUSE Bug 1117821", url: "https://bugzilla.suse.com/1117821", }, { category: "self", summary: "SUSE Bug 1117822", url: "https://bugzilla.suse.com/1117822", }, { category: "self", summary: "SUSE Bug 1117953", url: "https://bugzilla.suse.com/1117953", }, { category: "self", summary: "SUSE Bug 1118102", url: "https://bugzilla.suse.com/1118102", }, { category: "self", summary: "SUSE Bug 1118136", url: "https://bugzilla.suse.com/1118136", }, { category: "self", summary: "SUSE Bug 1118137", url: "https://bugzilla.suse.com/1118137", }, { category: "self", summary: "SUSE Bug 1118138", url: "https://bugzilla.suse.com/1118138", }, { category: "self", summary: "SUSE Bug 1118140", url: "https://bugzilla.suse.com/1118140", }, { category: "self", summary: "SUSE Bug 1118152", url: "https://bugzilla.suse.com/1118152", }, { category: "self", summary: "SUSE Bug 1118215", url: "https://bugzilla.suse.com/1118215", }, { category: "self", summary: "SUSE Bug 1118316", url: "https://bugzilla.suse.com/1118316", }, { category: "self", summary: "SUSE Bug 1118319", url: "https://bugzilla.suse.com/1118319", }, { category: "self", summary: "SUSE Bug 1118428", url: "https://bugzilla.suse.com/1118428", }, { category: "self", summary: "SUSE Bug 1118484", url: "https://bugzilla.suse.com/1118484", }, { category: "self", summary: "SUSE Bug 1118505", url: "https://bugzilla.suse.com/1118505", }, { category: "self", summary: "SUSE Bug 1118752", url: "https://bugzilla.suse.com/1118752", }, { category: "self", summary: "SUSE Bug 1118760", url: "https://bugzilla.suse.com/1118760", }, { category: "self", summary: "SUSE Bug 1118761", url: "https://bugzilla.suse.com/1118761", }, { category: "self", summary: "SUSE Bug 1118762", url: "https://bugzilla.suse.com/1118762", }, { category: "self", summary: "SUSE Bug 1118766", url: "https://bugzilla.suse.com/1118766", }, { category: "self", summary: "SUSE Bug 1118767", url: "https://bugzilla.suse.com/1118767", }, { category: "self", summary: "SUSE Bug 1118768", url: "https://bugzilla.suse.com/1118768", }, { category: "self", summary: "SUSE Bug 1118769", url: "https://bugzilla.suse.com/1118769", }, { category: "self", summary: "SUSE Bug 1118771", url: "https://bugzilla.suse.com/1118771", }, { category: "self", summary: "SUSE Bug 1118772", url: "https://bugzilla.suse.com/1118772", }, { category: "self", summary: "SUSE Bug 1118773", url: "https://bugzilla.suse.com/1118773", }, { category: "self", summary: "SUSE Bug 1118774", url: "https://bugzilla.suse.com/1118774", }, { category: "self", summary: "SUSE Bug 1118775", url: "https://bugzilla.suse.com/1118775", }, { category: "self", summary: "SUSE Bug 1118798", url: "https://bugzilla.suse.com/1118798", }, { category: "self", summary: "SUSE Bug 1118809", url: "https://bugzilla.suse.com/1118809", }, { category: "self", summary: "SUSE Bug 1118962", url: "https://bugzilla.suse.com/1118962", }, { category: "self", summary: "SUSE Bug 1119017", url: "https://bugzilla.suse.com/1119017", }, { category: "self", summary: "SUSE Bug 1119086", url: "https://bugzilla.suse.com/1119086", }, { category: "self", summary: "SUSE Bug 1119212", url: "https://bugzilla.suse.com/1119212", }, { category: "self", summary: "SUSE Bug 1119322", url: "https://bugzilla.suse.com/1119322", }, { category: "self", summary: "SUSE Bug 1119410", url: "https://bugzilla.suse.com/1119410", }, { category: "self", summary: "SUSE Bug 1119714", url: "https://bugzilla.suse.com/1119714", }, { category: "self", summary: "SUSE Bug 1119749", url: "https://bugzilla.suse.com/1119749", }, { category: "self", summary: "SUSE Bug 1119804", url: "https://bugzilla.suse.com/1119804", }, { category: "self", summary: "SUSE Bug 1119946", url: "https://bugzilla.suse.com/1119946", }, { category: "self", summary: "SUSE Bug 1119962", url: "https://bugzilla.suse.com/1119962", }, { category: "self", summary: "SUSE Bug 1119968", url: "https://bugzilla.suse.com/1119968", }, { category: "self", summary: "SUSE Bug 1120036", url: "https://bugzilla.suse.com/1120036", }, { category: "self", summary: "SUSE Bug 1120046", url: "https://bugzilla.suse.com/1120046", }, { category: "self", summary: "SUSE Bug 1120053", url: "https://bugzilla.suse.com/1120053", }, { category: "self", summary: "SUSE Bug 1120054", url: "https://bugzilla.suse.com/1120054", }, { category: "self", summary: "SUSE Bug 1120055", url: "https://bugzilla.suse.com/1120055", }, { category: "self", summary: "SUSE Bug 1120058", url: "https://bugzilla.suse.com/1120058", }, { category: "self", summary: "SUSE Bug 1120088", url: "https://bugzilla.suse.com/1120088", }, { category: "self", summary: "SUSE Bug 1120092", url: "https://bugzilla.suse.com/1120092", }, { category: "self", summary: "SUSE Bug 1120094", url: "https://bugzilla.suse.com/1120094", }, { category: "self", summary: "SUSE Bug 1120096", url: "https://bugzilla.suse.com/1120096", }, { category: "self", summary: "SUSE Bug 1120097", url: "https://bugzilla.suse.com/1120097", }, { category: "self", summary: "SUSE Bug 1120173", url: "https://bugzilla.suse.com/1120173", }, { category: "self", summary: "SUSE Bug 1120214", url: "https://bugzilla.suse.com/1120214", }, { category: "self", summary: "SUSE Bug 1120223", url: "https://bugzilla.suse.com/1120223", }, { category: "self", summary: "SUSE Bug 1120228", url: "https://bugzilla.suse.com/1120228", }, { category: "self", summary: "SUSE Bug 1120230", url: "https://bugzilla.suse.com/1120230", }, { category: "self", summary: "SUSE Bug 1120232", url: "https://bugzilla.suse.com/1120232", }, { category: "self", summary: "SUSE Bug 1120234", url: "https://bugzilla.suse.com/1120234", }, { category: "self", summary: "SUSE Bug 1120235", url: "https://bugzilla.suse.com/1120235", }, { category: "self", summary: "SUSE Bug 1120238", url: "https://bugzilla.suse.com/1120238", }, { category: "self", summary: "SUSE Bug 1120594", url: "https://bugzilla.suse.com/1120594", }, { category: "self", summary: "SUSE Bug 1120598", url: "https://bugzilla.suse.com/1120598", }, { category: "self", summary: "SUSE Bug 1120600", url: "https://bugzilla.suse.com/1120600", }, { category: "self", summary: "SUSE Bug 1120601", url: "https://bugzilla.suse.com/1120601", }, { category: "self", summary: "SUSE Bug 1120602", url: "https://bugzilla.suse.com/1120602", }, { category: "self", summary: "SUSE Bug 1120603", url: "https://bugzilla.suse.com/1120603", }, { category: "self", summary: "SUSE Bug 1120604", url: "https://bugzilla.suse.com/1120604", }, { category: "self", summary: "SUSE Bug 1120606", url: "https://bugzilla.suse.com/1120606", }, { category: "self", summary: "SUSE Bug 1120612", url: "https://bugzilla.suse.com/1120612", }, { category: "self", summary: "SUSE Bug 1120613", url: "https://bugzilla.suse.com/1120613", }, { category: "self", summary: "SUSE Bug 1120614", url: "https://bugzilla.suse.com/1120614", }, { category: "self", summary: "SUSE Bug 1120615", url: "https://bugzilla.suse.com/1120615", }, { category: "self", summary: "SUSE Bug 1120616", url: "https://bugzilla.suse.com/1120616", }, { category: "self", summary: "SUSE Bug 1120617", url: "https://bugzilla.suse.com/1120617", }, { category: "self", summary: "SUSE Bug 1120618", url: "https://bugzilla.suse.com/1120618", }, { category: "self", summary: "SUSE Bug 1120620", url: "https://bugzilla.suse.com/1120620", }, { category: "self", summary: "SUSE Bug 1120621", url: "https://bugzilla.suse.com/1120621", }, { category: "self", summary: "SUSE Bug 1120632", url: "https://bugzilla.suse.com/1120632", }, { category: "self", summary: "SUSE Bug 1120633", url: "https://bugzilla.suse.com/1120633", }, { category: "self", summary: "SUSE Bug 1120743", url: "https://bugzilla.suse.com/1120743", }, { category: "self", summary: "SUSE Bug 1120954", url: "https://bugzilla.suse.com/1120954", }, { category: "self", summary: "SUSE Bug 1121017", url: "https://bugzilla.suse.com/1121017", }, { category: "self", summary: "SUSE Bug 1121058", url: "https://bugzilla.suse.com/1121058", }, { category: "self", summary: "SUSE Bug 1121263", url: "https://bugzilla.suse.com/1121263", }, { category: "self", summary: "SUSE Bug 1121273", url: "https://bugzilla.suse.com/1121273", }, { category: "self", summary: "SUSE Bug 1121477", url: "https://bugzilla.suse.com/1121477", }, { category: "self", summary: "SUSE Bug 1121483", url: "https://bugzilla.suse.com/1121483", }, { category: "self", summary: "SUSE Bug 1121599", url: "https://bugzilla.suse.com/1121599", }, { category: "self", summary: "SUSE Bug 1121621", url: "https://bugzilla.suse.com/1121621", }, { category: "self", summary: "SUSE Bug 1121714", url: "https://bugzilla.suse.com/1121714", }, { category: "self", summary: "SUSE Bug 1121715", url: "https://bugzilla.suse.com/1121715", }, { category: "self", summary: "SUSE Bug 1121973", url: "https://bugzilla.suse.com/1121973", }, { category: "self", summary: "SUSE CVE CVE-2018-12232 page", url: "https://www.suse.com/security/cve/CVE-2018-12232/", }, { category: "self", summary: "SUSE CVE CVE-2018-14625 page", url: "https://www.suse.com/security/cve/CVE-2018-14625/", }, { category: "self", summary: "SUSE CVE CVE-2018-16862 page", url: "https://www.suse.com/security/cve/CVE-2018-16862/", }, { category: "self", summary: "SUSE CVE CVE-2018-16884 page", url: "https://www.suse.com/security/cve/CVE-2018-16884/", }, { category: "self", summary: "SUSE CVE CVE-2018-18281 page", url: "https://www.suse.com/security/cve/CVE-2018-18281/", }, { category: "self", summary: "SUSE CVE CVE-2018-18397 page", url: "https://www.suse.com/security/cve/CVE-2018-18397/", }, { category: "self", summary: "SUSE CVE CVE-2018-18710 page", url: "https://www.suse.com/security/cve/CVE-2018-18710/", }, { category: "self", summary: "SUSE CVE CVE-2018-19407 page", url: "https://www.suse.com/security/cve/CVE-2018-19407/", }, { category: "self", summary: "SUSE CVE CVE-2018-19824 page", url: "https://www.suse.com/security/cve/CVE-2018-19824/", }, { category: "self", summary: "SUSE CVE CVE-2018-19854 page", url: "https://www.suse.com/security/cve/CVE-2018-19854/", }, { category: "self", summary: "SUSE CVE CVE-2018-19985 page", url: "https://www.suse.com/security/cve/CVE-2018-19985/", }, { category: "self", summary: "SUSE CVE CVE-2018-20169 page", url: "https://www.suse.com/security/cve/CVE-2018-20169/", }, { category: "self", summary: "SUSE CVE CVE-2018-9568 page", url: "https://www.suse.com/security/cve/CVE-2018-9568/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2019-02-01T18:55:03Z", generator: { date: "2019-02-01T18:55:03Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:0224-1", initial_release_date: "2019-02-01T18:55:03Z", revision_history: [ { date: "2019-02-01T18:55:03Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-25.28.1.aarch64", product: { name: "cluster-md-kmp-default-4.12.14-25.28.1.aarch64", product_id: "cluster-md-kmp-default-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-25.28.1.aarch64", product: { name: "dlm-kmp-default-4.12.14-25.28.1.aarch64", product_id: "dlm-kmp-default-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "dtb-al-4.12.14-25.28.1.aarch64", product: { name: "dtb-al-4.12.14-25.28.1.aarch64", product_id: "dtb-al-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "dtb-allwinner-4.12.14-25.28.1.aarch64", product: { name: "dtb-allwinner-4.12.14-25.28.1.aarch64", product_id: "dtb-allwinner-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "dtb-altera-4.12.14-25.28.1.aarch64", product: { name: "dtb-altera-4.12.14-25.28.1.aarch64", product_id: "dtb-altera-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "dtb-amd-4.12.14-25.28.1.aarch64", product: { name: "dtb-amd-4.12.14-25.28.1.aarch64", product_id: "dtb-amd-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "dtb-amlogic-4.12.14-25.28.1.aarch64", product: { name: "dtb-amlogic-4.12.14-25.28.1.aarch64", product_id: "dtb-amlogic-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "dtb-apm-4.12.14-25.28.1.aarch64", product: { name: "dtb-apm-4.12.14-25.28.1.aarch64", product_id: "dtb-apm-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "dtb-arm-4.12.14-25.28.1.aarch64", product: { name: "dtb-arm-4.12.14-25.28.1.aarch64", product_id: "dtb-arm-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "dtb-broadcom-4.12.14-25.28.1.aarch64", product: { name: "dtb-broadcom-4.12.14-25.28.1.aarch64", product_id: "dtb-broadcom-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "dtb-cavium-4.12.14-25.28.1.aarch64", product: { name: "dtb-cavium-4.12.14-25.28.1.aarch64", product_id: "dtb-cavium-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "dtb-exynos-4.12.14-25.28.1.aarch64", product: { name: "dtb-exynos-4.12.14-25.28.1.aarch64", product_id: "dtb-exynos-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "dtb-freescale-4.12.14-25.28.1.aarch64", product: { name: "dtb-freescale-4.12.14-25.28.1.aarch64", product_id: "dtb-freescale-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "dtb-hisilicon-4.12.14-25.28.1.aarch64", product: { name: "dtb-hisilicon-4.12.14-25.28.1.aarch64", product_id: "dtb-hisilicon-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "dtb-lg-4.12.14-25.28.1.aarch64", product: { name: "dtb-lg-4.12.14-25.28.1.aarch64", product_id: "dtb-lg-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "dtb-marvell-4.12.14-25.28.1.aarch64", product: { name: "dtb-marvell-4.12.14-25.28.1.aarch64", product_id: "dtb-marvell-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "dtb-mediatek-4.12.14-25.28.1.aarch64", product: { name: "dtb-mediatek-4.12.14-25.28.1.aarch64", product_id: "dtb-mediatek-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "dtb-nvidia-4.12.14-25.28.1.aarch64", product: { name: "dtb-nvidia-4.12.14-25.28.1.aarch64", product_id: "dtb-nvidia-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "dtb-qcom-4.12.14-25.28.1.aarch64", product: { name: "dtb-qcom-4.12.14-25.28.1.aarch64", product_id: "dtb-qcom-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "dtb-renesas-4.12.14-25.28.1.aarch64", product: { name: "dtb-renesas-4.12.14-25.28.1.aarch64", product_id: "dtb-renesas-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "dtb-rockchip-4.12.14-25.28.1.aarch64", product: { name: "dtb-rockchip-4.12.14-25.28.1.aarch64", product_id: "dtb-rockchip-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "dtb-socionext-4.12.14-25.28.1.aarch64", product: { name: "dtb-socionext-4.12.14-25.28.1.aarch64", product_id: "dtb-socionext-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "dtb-sprd-4.12.14-25.28.1.aarch64", product: { name: "dtb-sprd-4.12.14-25.28.1.aarch64", product_id: "dtb-sprd-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "dtb-xilinx-4.12.14-25.28.1.aarch64", product: { name: "dtb-xilinx-4.12.14-25.28.1.aarch64", product_id: "dtb-xilinx-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "dtb-zte-4.12.14-25.28.1.aarch64", product: { name: "dtb-zte-4.12.14-25.28.1.aarch64", product_id: "dtb-zte-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-25.28.1.aarch64", product: { name: "gfs2-kmp-default-4.12.14-25.28.1.aarch64", product_id: "gfs2-kmp-default-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "kernel-default-4.12.14-25.28.1.aarch64", product: { name: "kernel-default-4.12.14-25.28.1.aarch64", product_id: "kernel-default-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-25.28.1.aarch64", product: { name: "kernel-default-base-4.12.14-25.28.1.aarch64", product_id: "kernel-default-base-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-25.28.1.aarch64", product: { name: "kernel-default-devel-4.12.14-25.28.1.aarch64", product_id: "kernel-default-devel-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-25.28.1.aarch64", product: { name: "kernel-default-extra-4.12.14-25.28.1.aarch64", product_id: "kernel-default-extra-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-25.28.1.aarch64", product: { name: "kernel-default-livepatch-4.12.14-25.28.1.aarch64", product_id: "kernel-default-livepatch-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-25.28.1.aarch64", product: { name: "kernel-obs-build-4.12.14-25.28.1.aarch64", product_id: "kernel-obs-build-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-25.28.1.aarch64", product: { name: "kernel-obs-qa-4.12.14-25.28.1.aarch64", product_id: "kernel-obs-qa-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-25.28.1.aarch64", product: { name: "kernel-syms-4.12.14-25.28.1.aarch64", product_id: "kernel-syms-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-25.28.1.aarch64", product: { name: "kernel-vanilla-4.12.14-25.28.1.aarch64", product_id: "kernel-vanilla-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-25.28.1.aarch64", product: { name: "kernel-vanilla-base-4.12.14-25.28.1.aarch64", product_id: "kernel-vanilla-base-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-25.28.1.aarch64", product: { name: "kernel-vanilla-devel-4.12.14-25.28.1.aarch64", product_id: "kernel-vanilla-devel-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-25.28.1.aarch64", product: { name: "kselftests-kmp-default-4.12.14-25.28.1.aarch64", product_id: "kselftests-kmp-default-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-25.28.1.aarch64", product: { name: "ocfs2-kmp-default-4.12.14-25.28.1.aarch64", product_id: "ocfs2-kmp-default-4.12.14-25.28.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-25.28.1.aarch64", product: { name: "reiserfs-kmp-default-4.12.14-25.28.1.aarch64", product_id: "reiserfs-kmp-default-4.12.14-25.28.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-4.12.14-25.28.1.noarch", product: { name: "kernel-devel-4.12.14-25.28.1.noarch", product_id: "kernel-devel-4.12.14-25.28.1.noarch", }, }, { category: "product_version", name: "kernel-docs-4.12.14-25.28.1.noarch", product: { name: "kernel-docs-4.12.14-25.28.1.noarch", product_id: "kernel-docs-4.12.14-25.28.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-4.12.14-25.28.1.noarch", product: { name: "kernel-docs-html-4.12.14-25.28.1.noarch", product_id: "kernel-docs-html-4.12.14-25.28.1.noarch", }, }, { category: "product_version", name: "kernel-macros-4.12.14-25.28.1.noarch", product: { name: "kernel-macros-4.12.14-25.28.1.noarch", product_id: "kernel-macros-4.12.14-25.28.1.noarch", }, }, { category: "product_version", name: "kernel-source-4.12.14-25.28.1.noarch", product: { name: "kernel-source-4.12.14-25.28.1.noarch", product_id: "kernel-source-4.12.14-25.28.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-4.12.14-25.28.1.noarch", product: { name: "kernel-source-vanilla-4.12.14-25.28.1.noarch", product_id: "kernel-source-vanilla-4.12.14-25.28.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-debug-4.12.14-25.28.1.ppc64le", product: { name: "cluster-md-kmp-debug-4.12.14-25.28.1.ppc64le", product_id: "cluster-md-kmp-debug-4.12.14-25.28.1.ppc64le", }, }, { category: "product_version", name: "cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", product: { name: "cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", product_id: "cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-debug-4.12.14-25.28.1.ppc64le", product: { name: "dlm-kmp-debug-4.12.14-25.28.1.ppc64le", product_id: "dlm-kmp-debug-4.12.14-25.28.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-25.28.1.ppc64le", product: { name: "dlm-kmp-default-4.12.14-25.28.1.ppc64le", product_id: "dlm-kmp-default-4.12.14-25.28.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-debug-4.12.14-25.28.1.ppc64le", product: { name: "gfs2-kmp-debug-4.12.14-25.28.1.ppc64le", product_id: "gfs2-kmp-debug-4.12.14-25.28.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-25.28.1.ppc64le", product: { name: "gfs2-kmp-default-4.12.14-25.28.1.ppc64le", product_id: "gfs2-kmp-default-4.12.14-25.28.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-4.12.14-25.28.1.ppc64le", product: { name: "kernel-debug-4.12.14-25.28.1.ppc64le", product_id: "kernel-debug-4.12.14-25.28.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-25.28.1.ppc64le", product: { name: "kernel-debug-base-4.12.14-25.28.1.ppc64le", product_id: "kernel-debug-base-4.12.14-25.28.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-25.28.1.ppc64le", product: { name: "kernel-debug-devel-4.12.14-25.28.1.ppc64le", product_id: "kernel-debug-devel-4.12.14-25.28.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-extra-4.12.14-25.28.1.ppc64le", product: { name: "kernel-debug-extra-4.12.14-25.28.1.ppc64le", product_id: "kernel-debug-extra-4.12.14-25.28.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-livepatch-4.12.14-25.28.1.ppc64le", product: { name: "kernel-debug-livepatch-4.12.14-25.28.1.ppc64le", product_id: "kernel-debug-livepatch-4.12.14-25.28.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-4.12.14-25.28.1.ppc64le", product: { name: "kernel-default-4.12.14-25.28.1.ppc64le", product_id: "kernel-default-4.12.14-25.28.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-25.28.1.ppc64le", product: { name: "kernel-default-base-4.12.14-25.28.1.ppc64le", product_id: "kernel-default-base-4.12.14-25.28.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-25.28.1.ppc64le", product: { name: "kernel-default-devel-4.12.14-25.28.1.ppc64le", product_id: "kernel-default-devel-4.12.14-25.28.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-25.28.1.ppc64le", product: { name: "kernel-default-extra-4.12.14-25.28.1.ppc64le", product_id: "kernel-default-extra-4.12.14-25.28.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-25.28.1.ppc64le", product: { name: "kernel-default-livepatch-4.12.14-25.28.1.ppc64le", product_id: "kernel-default-livepatch-4.12.14-25.28.1.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", product: { name: "kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", product_id: "kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-25.28.1.ppc64le", product: { name: "kernel-obs-build-4.12.14-25.28.1.ppc64le", product_id: "kernel-obs-build-4.12.14-25.28.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-25.28.1.ppc64le", product: { name: "kernel-obs-qa-4.12.14-25.28.1.ppc64le", product_id: "kernel-obs-qa-4.12.14-25.28.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-4.12.14-25.28.1.ppc64le", product: { name: "kernel-syms-4.12.14-25.28.1.ppc64le", product_id: "kernel-syms-4.12.14-25.28.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-25.28.1.ppc64le", product: { name: "kernel-vanilla-4.12.14-25.28.1.ppc64le", product_id: "kernel-vanilla-4.12.14-25.28.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-25.28.1.ppc64le", product: { name: "kernel-vanilla-base-4.12.14-25.28.1.ppc64le", product_id: "kernel-vanilla-base-4.12.14-25.28.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-25.28.1.ppc64le", product: { name: "kernel-vanilla-devel-4.12.14-25.28.1.ppc64le", product_id: "kernel-vanilla-devel-4.12.14-25.28.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-debug-4.12.14-25.28.1.ppc64le", product: { name: "kselftests-kmp-debug-4.12.14-25.28.1.ppc64le", product_id: "kselftests-kmp-debug-4.12.14-25.28.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-25.28.1.ppc64le", product: { name: "kselftests-kmp-default-4.12.14-25.28.1.ppc64le", product_id: "kselftests-kmp-default-4.12.14-25.28.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-debug-4.12.14-25.28.1.ppc64le", product: { name: "ocfs2-kmp-debug-4.12.14-25.28.1.ppc64le", product_id: "ocfs2-kmp-debug-4.12.14-25.28.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", product: { name: "ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", product_id: "ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", }, }, { category: "product_version", name: "reiserfs-kmp-debug-4.12.14-25.28.1.ppc64le", product: { name: "reiserfs-kmp-debug-4.12.14-25.28.1.ppc64le", product_id: "reiserfs-kmp-debug-4.12.14-25.28.1.ppc64le", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", product: { name: "reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", product_id: "reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-25.28.1.s390x", product: { name: "cluster-md-kmp-default-4.12.14-25.28.1.s390x", product_id: "cluster-md-kmp-default-4.12.14-25.28.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-25.28.1.s390x", product: { name: "dlm-kmp-default-4.12.14-25.28.1.s390x", product_id: "dlm-kmp-default-4.12.14-25.28.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-25.28.1.s390x", product: { name: "gfs2-kmp-default-4.12.14-25.28.1.s390x", product_id: "gfs2-kmp-default-4.12.14-25.28.1.s390x", }, }, { category: "product_version", name: "kernel-default-4.12.14-25.28.1.s390x", product: { name: "kernel-default-4.12.14-25.28.1.s390x", product_id: "kernel-default-4.12.14-25.28.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-25.28.1.s390x", product: { name: "kernel-default-base-4.12.14-25.28.1.s390x", product_id: "kernel-default-base-4.12.14-25.28.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-25.28.1.s390x", product: { name: "kernel-default-devel-4.12.14-25.28.1.s390x", product_id: "kernel-default-devel-4.12.14-25.28.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-25.28.1.s390x", product: { name: "kernel-default-extra-4.12.14-25.28.1.s390x", product_id: "kernel-default-extra-4.12.14-25.28.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-25.28.1.s390x", product: { name: "kernel-default-livepatch-4.12.14-25.28.1.s390x", product_id: "kernel-default-livepatch-4.12.14-25.28.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-4.12.14-25.28.1.s390x", product: { name: "kernel-default-man-4.12.14-25.28.1.s390x", product_id: "kernel-default-man-4.12.14-25.28.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-25.28.1.s390x", product: { name: "kernel-obs-build-4.12.14-25.28.1.s390x", product_id: "kernel-obs-build-4.12.14-25.28.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-25.28.1.s390x", product: { name: "kernel-obs-qa-4.12.14-25.28.1.s390x", product_id: "kernel-obs-qa-4.12.14-25.28.1.s390x", }, }, { category: "product_version", name: "kernel-syms-4.12.14-25.28.1.s390x", product: { name: "kernel-syms-4.12.14-25.28.1.s390x", product_id: "kernel-syms-4.12.14-25.28.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-25.28.1.s390x", product: { name: "kernel-vanilla-4.12.14-25.28.1.s390x", product_id: "kernel-vanilla-4.12.14-25.28.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-25.28.1.s390x", product: { name: "kernel-vanilla-base-4.12.14-25.28.1.s390x", product_id: "kernel-vanilla-base-4.12.14-25.28.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-25.28.1.s390x", product: { name: "kernel-vanilla-devel-4.12.14-25.28.1.s390x", product_id: "kernel-vanilla-devel-4.12.14-25.28.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-4.12.14-25.28.1.s390x", product: { name: "kernel-zfcpdump-4.12.14-25.28.1.s390x", product_id: "kernel-zfcpdump-4.12.14-25.28.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-man-4.12.14-25.28.1.s390x", product: { name: "kernel-zfcpdump-man-4.12.14-25.28.1.s390x", product_id: "kernel-zfcpdump-man-4.12.14-25.28.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-25.28.1.s390x", product: { name: "kselftests-kmp-default-4.12.14-25.28.1.s390x", product_id: "kselftests-kmp-default-4.12.14-25.28.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-25.28.1.s390x", product: { name: "ocfs2-kmp-default-4.12.14-25.28.1.s390x", product_id: "ocfs2-kmp-default-4.12.14-25.28.1.s390x", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-25.28.1.s390x", product: { name: "reiserfs-kmp-default-4.12.14-25.28.1.s390x", product_id: "reiserfs-kmp-default-4.12.14-25.28.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-debug-4.12.14-25.28.1.x86_64", product: { name: "cluster-md-kmp-debug-4.12.14-25.28.1.x86_64", product_id: "cluster-md-kmp-debug-4.12.14-25.28.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-default-4.12.14-25.28.1.x86_64", product: { name: "cluster-md-kmp-default-4.12.14-25.28.1.x86_64", product_id: "cluster-md-kmp-default-4.12.14-25.28.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-debug-4.12.14-25.28.1.x86_64", product: { name: "dlm-kmp-debug-4.12.14-25.28.1.x86_64", product_id: "dlm-kmp-debug-4.12.14-25.28.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-25.28.1.x86_64", product: { name: "dlm-kmp-default-4.12.14-25.28.1.x86_64", product_id: "dlm-kmp-default-4.12.14-25.28.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-debug-4.12.14-25.28.1.x86_64", product: { name: "gfs2-kmp-debug-4.12.14-25.28.1.x86_64", product_id: "gfs2-kmp-debug-4.12.14-25.28.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-25.28.1.x86_64", product: { name: "gfs2-kmp-default-4.12.14-25.28.1.x86_64", product_id: "gfs2-kmp-default-4.12.14-25.28.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-4.12.14-25.28.1.x86_64", product: { name: "kernel-debug-4.12.14-25.28.1.x86_64", product_id: "kernel-debug-4.12.14-25.28.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-25.28.1.x86_64", product: { name: "kernel-debug-base-4.12.14-25.28.1.x86_64", product_id: "kernel-debug-base-4.12.14-25.28.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-25.28.1.x86_64", product: { name: "kernel-debug-devel-4.12.14-25.28.1.x86_64", product_id: "kernel-debug-devel-4.12.14-25.28.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-extra-4.12.14-25.28.1.x86_64", product: { name: "kernel-debug-extra-4.12.14-25.28.1.x86_64", product_id: "kernel-debug-extra-4.12.14-25.28.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-livepatch-4.12.14-25.28.1.x86_64", product: { name: "kernel-debug-livepatch-4.12.14-25.28.1.x86_64", product_id: "kernel-debug-livepatch-4.12.14-25.28.1.x86_64", }, }, { category: "product_version", name: "kernel-default-4.12.14-25.28.1.x86_64", product: { name: "kernel-default-4.12.14-25.28.1.x86_64", product_id: "kernel-default-4.12.14-25.28.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-25.28.1.x86_64", product: { name: "kernel-default-base-4.12.14-25.28.1.x86_64", product_id: "kernel-default-base-4.12.14-25.28.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-25.28.1.x86_64", product: { name: "kernel-default-devel-4.12.14-25.28.1.x86_64", product_id: "kernel-default-devel-4.12.14-25.28.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-25.28.1.x86_64", product: { name: "kernel-default-extra-4.12.14-25.28.1.x86_64", product_id: "kernel-default-extra-4.12.14-25.28.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-25.28.1.x86_64", product: { name: "kernel-default-livepatch-4.12.14-25.28.1.x86_64", product_id: "kernel-default-livepatch-4.12.14-25.28.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-4.12.14-25.28.1.x86_64", product: { name: "kernel-kvmsmall-4.12.14-25.28.1.x86_64", product_id: "kernel-kvmsmall-4.12.14-25.28.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-base-4.12.14-25.28.1.x86_64", product: { name: "kernel-kvmsmall-base-4.12.14-25.28.1.x86_64", product_id: "kernel-kvmsmall-base-4.12.14-25.28.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-4.12.14-25.28.1.x86_64", product: { name: "kernel-kvmsmall-devel-4.12.14-25.28.1.x86_64", product_id: "kernel-kvmsmall-devel-4.12.14-25.28.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", product: { name: "kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", product_id: "kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-25.28.1.x86_64", product: { name: "kernel-obs-build-4.12.14-25.28.1.x86_64", product_id: "kernel-obs-build-4.12.14-25.28.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-25.28.1.x86_64", product: { name: "kernel-obs-qa-4.12.14-25.28.1.x86_64", product_id: "kernel-obs-qa-4.12.14-25.28.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-25.28.1.x86_64", product: { name: "kernel-syms-4.12.14-25.28.1.x86_64", product_id: "kernel-syms-4.12.14-25.28.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-25.28.1.x86_64", product: { name: "kernel-vanilla-4.12.14-25.28.1.x86_64", product_id: "kernel-vanilla-4.12.14-25.28.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-25.28.1.x86_64", product: { name: "kernel-vanilla-base-4.12.14-25.28.1.x86_64", product_id: "kernel-vanilla-base-4.12.14-25.28.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-25.28.1.x86_64", product: { name: "kernel-vanilla-devel-4.12.14-25.28.1.x86_64", product_id: "kernel-vanilla-devel-4.12.14-25.28.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-debug-4.12.14-25.28.1.x86_64", product: { name: "kselftests-kmp-debug-4.12.14-25.28.1.x86_64", product_id: "kselftests-kmp-debug-4.12.14-25.28.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-25.28.1.x86_64", product: { name: "kselftests-kmp-default-4.12.14-25.28.1.x86_64", product_id: "kselftests-kmp-default-4.12.14-25.28.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-debug-4.12.14-25.28.1.x86_64", product: { name: "ocfs2-kmp-debug-4.12.14-25.28.1.x86_64", product_id: "ocfs2-kmp-debug-4.12.14-25.28.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-25.28.1.x86_64", product: { name: "ocfs2-kmp-default-4.12.14-25.28.1.x86_64", product_id: "ocfs2-kmp-default-4.12.14-25.28.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-debug-4.12.14-25.28.1.x86_64", product: { name: "reiserfs-kmp-debug-4.12.14-25.28.1.x86_64", product_id: "reiserfs-kmp-debug-4.12.14-25.28.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-25.28.1.x86_64", product: { name: "reiserfs-kmp-default-4.12.14-25.28.1.x86_64", product_id: "reiserfs-kmp-default-4.12.14-25.28.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15", product: { name: "SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Development Tools 15", product: { name: "SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-development-tools:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Legacy 15", product: { name: "SUSE Linux Enterprise Module for Legacy 15", product_id: "SUSE Linux Enterprise Module for Legacy 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-legacy:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15", product: { name: "SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 15", product: { name: "SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 15", product: { name: "SUSE Linux Enterprise Workstation Extension 15", product_id: "SUSE Linux Enterprise Workstation Extension 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:15", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-25.28.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", }, product_reference: "kernel-default-4.12.14-25.28.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-25.28.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", }, product_reference: "kernel-default-4.12.14-25.28.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-25.28.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", }, product_reference: "kernel-default-4.12.14-25.28.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-25.28.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", }, product_reference: "kernel-default-4.12.14-25.28.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-25.28.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", }, product_reference: "kernel-default-base-4.12.14-25.28.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-25.28.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", }, product_reference: "kernel-default-base-4.12.14-25.28.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-25.28.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", }, product_reference: "kernel-default-base-4.12.14-25.28.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-25.28.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-25.28.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-25.28.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", }, product_reference: "kernel-default-devel-4.12.14-25.28.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-25.28.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-25.28.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-25.28.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", }, product_reference: "kernel-default-devel-4.12.14-25.28.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-25.28.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-25.28.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.12.14-25.28.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", }, product_reference: "kernel-default-man-4.12.14-25.28.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-25.28.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", }, product_reference: "kernel-devel-4.12.14-25.28.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-25.28.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", }, product_reference: "kernel-macros-4.12.14-25.28.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-4.12.14-25.28.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", }, product_reference: "kernel-zfcpdump-4.12.14-25.28.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-25.28.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", }, product_reference: "kernel-docs-4.12.14-25.28.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-25.28.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", }, product_reference: "kernel-obs-build-4.12.14-25.28.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-25.28.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", }, product_reference: "kernel-obs-build-4.12.14-25.28.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-25.28.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", }, product_reference: "kernel-obs-build-4.12.14-25.28.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-25.28.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-25.28.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-25.28.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", }, product_reference: "kernel-source-4.12.14-25.28.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-25.28.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", }, product_reference: "kernel-syms-4.12.14-25.28.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-25.28.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", }, product_reference: "kernel-syms-4.12.14-25.28.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-25.28.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", }, product_reference: "kernel-syms-4.12.14-25.28.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-25.28.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", }, product_reference: "kernel-syms-4.12.14-25.28.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-25.28.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", }, product_reference: "kernel-vanilla-base-4.12.14-25.28.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-25.28.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", }, product_reference: "kernel-vanilla-base-4.12.14-25.28.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-25.28.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", }, product_reference: "kernel-vanilla-base-4.12.14-25.28.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-25.28.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", }, product_reference: "kernel-vanilla-base-4.12.14-25.28.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-25.28.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15", product_id: "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", }, product_reference: "reiserfs-kmp-default-4.12.14-25.28.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-25.28.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15", product_id: "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", }, product_reference: "reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-25.28.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15", product_id: "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", }, product_reference: "reiserfs-kmp-default-4.12.14-25.28.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-25.28.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15", product_id: "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", }, product_reference: "reiserfs-kmp-default-4.12.14-25.28.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-4.12.14-25.28.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", }, product_reference: "kernel-default-livepatch-4.12.14-25.28.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-4.12.14-25.28.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", }, product_reference: "kernel-default-livepatch-4.12.14-25.28.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", }, product_reference: "kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", }, product_reference: "kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-25.28.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", }, product_reference: "cluster-md-kmp-default-4.12.14-25.28.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-25.28.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", }, product_reference: "cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-25.28.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", }, product_reference: "cluster-md-kmp-default-4.12.14-25.28.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-25.28.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", }, product_reference: "cluster-md-kmp-default-4.12.14-25.28.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-25.28.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", }, product_reference: "dlm-kmp-default-4.12.14-25.28.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-25.28.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", }, product_reference: "dlm-kmp-default-4.12.14-25.28.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-25.28.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", }, product_reference: "dlm-kmp-default-4.12.14-25.28.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-25.28.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", }, product_reference: "dlm-kmp-default-4.12.14-25.28.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-25.28.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", }, product_reference: "gfs2-kmp-default-4.12.14-25.28.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-25.28.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", }, product_reference: "gfs2-kmp-default-4.12.14-25.28.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-25.28.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", }, product_reference: "gfs2-kmp-default-4.12.14-25.28.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-25.28.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", }, product_reference: "gfs2-kmp-default-4.12.14-25.28.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-25.28.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", }, product_reference: "ocfs2-kmp-default-4.12.14-25.28.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-25.28.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", }, product_reference: "ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-25.28.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", }, product_reference: "ocfs2-kmp-default-4.12.14-25.28.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-25.28.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", }, product_reference: "ocfs2-kmp-default-4.12.14-25.28.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-4.12.14-25.28.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15", product_id: "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", }, product_reference: "kernel-default-extra-4.12.14-25.28.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15", }, ], }, vulnerabilities: [ { cve: "CVE-2018-12232", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-12232", }, ], notes: [ { category: "general", text: "In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat's execution, leading to a NULL pointer dereference and system crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-12232", url: "https://www.suse.com/security/cve/CVE-2018-12232", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-12232", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1097593 for CVE-2018-12232", url: "https://bugzilla.suse.com/1097593", }, { category: "external", summary: "SUSE Bug 1125907 for CVE-2018-12232", url: "https://bugzilla.suse.com/1125907", }, { category: "external", summary: "SUSE Bug 1127757 for CVE-2018-12232", url: "https://bugzilla.suse.com/1127757", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-01T18:55:03Z", details: "important", }, ], title: "CVE-2018-12232", }, { cve: "CVE-2018-14625", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14625", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux Kernel where an attacker may be able to have an uncontrolled read to kernel-memory from within a vm guest. A race condition between connect() and close() function may allow an attacker using the AF_VSOCK protocol to gather a 4 byte information leak or possibly intercept or corrupt AF_VSOCK messages destined to other clients.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14625", url: "https://www.suse.com/security/cve/CVE-2018-14625", }, { category: "external", summary: "SUSE Bug 1106615 for CVE-2018-14625", url: "https://bugzilla.suse.com/1106615", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-01T18:55:03Z", details: "moderate", }, ], title: "CVE-2018-14625", }, { cve: "CVE-2018-16862", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16862", }, ], notes: [ { category: "general", text: "A security flaw was found in the Linux kernel in a way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16862", url: "https://www.suse.com/security/cve/CVE-2018-16862", }, { category: "external", summary: "SUSE Bug 1117186 for CVE-2018-16862", url: "https://bugzilla.suse.com/1117186", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-01T18:55:03Z", details: "moderate", }, ], title: "CVE-2018-16862", }, { cve: "CVE-2018-16884", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16884", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16884", url: "https://www.suse.com/security/cve/CVE-2018-16884", }, { category: "external", summary: "SUSE Bug 1119946 for CVE-2018-16884", url: "https://bugzilla.suse.com/1119946", }, { category: "external", summary: "SUSE Bug 1119947 for CVE-2018-16884", url: "https://bugzilla.suse.com/1119947", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-01T18:55:03Z", details: "important", }, ], title: "CVE-2018-16884", }, { cve: "CVE-2018-18281", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18281", }, ], notes: [ { category: "general", text: "Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. This is fixed in the following kernel versions: 4.9.135, 4.14.78, 4.18.16, 4.19.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18281", url: "https://www.suse.com/security/cve/CVE-2018-18281", }, { category: "external", summary: "SUSE Bug 1113769 for CVE-2018-18281", url: "https://bugzilla.suse.com/1113769", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-01T18:55:03Z", details: "moderate", }, ], title: "CVE-2018-18281", }, { cve: "CVE-2018-18397", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18397", }, ], notes: [ { category: "general", text: "The userfaultfd implementation in the Linux kernel before 4.19.7 mishandles access control for certain UFFDIO_ ioctl calls, as demonstrated by allowing local users to write data into holes in a tmpfs file (if the user has read-only access to that file, and that file contains holes), related to fs/userfaultfd.c and mm/userfaultfd.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18397", url: "https://www.suse.com/security/cve/CVE-2018-18397", }, { category: "external", summary: "SUSE Bug 1117656 for CVE-2018-18397", url: "https://bugzilla.suse.com/1117656", }, { category: "external", summary: "SUSE Bug 1171522 for CVE-2018-18397", url: "https://bugzilla.suse.com/1171522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-01T18:55:03Z", details: "moderate", }, ], title: "CVE-2018-18397", }, { cve: "CVE-2018-18710", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18710", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18710", url: "https://www.suse.com/security/cve/CVE-2018-18710", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-18710", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-01T18:55:03Z", details: "moderate", }, ], title: "CVE-2018-18710", }, { cve: "CVE-2018-19407", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19407", }, ], notes: [ { category: "general", text: "The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19407", url: "https://www.suse.com/security/cve/CVE-2018-19407", }, { category: "external", summary: "SUSE Bug 1116841 for CVE-2018-19407", url: "https://bugzilla.suse.com/1116841", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-01T18:55:03Z", details: "moderate", }, ], title: "CVE-2018-19407", }, { cve: "CVE-2018-19824", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19824", }, ], notes: [ { category: "general", text: "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19824", url: "https://www.suse.com/security/cve/CVE-2018-19824", }, { category: "external", summary: "SUSE Bug 1118152 for CVE-2018-19824", url: "https://bugzilla.suse.com/1118152", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-01T18:55:03Z", details: "moderate", }, ], title: "CVE-2018-19824", }, { cve: "CVE-2018-19854", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19854", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 4.19.3. crypto_report_one() and related functions in crypto/crypto_user.c (the crypto user configuration API) do not fully initialize structures that are copied to userspace, potentially leaking sensitive memory to user programs. NOTE: this is a CVE-2013-2547 regression but with easier exploitability because the attacker does not need a capability (however, the system must have the CONFIG_CRYPTO_USER kconfig option).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19854", url: "https://www.suse.com/security/cve/CVE-2018-19854", }, { category: "external", summary: "SUSE Bug 1118428 for CVE-2018-19854", url: "https://bugzilla.suse.com/1118428", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-01T18:55:03Z", details: "low", }, ], title: "CVE-2018-19854", }, { cve: "CVE-2018-19985", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19985", }, ], notes: [ { category: "general", text: "The function hso_get_config_data in drivers/net/usb/hso.c in the Linux kernel through 4.19.8 reads if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allows arbitrary read in the kernel address space.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19985", url: "https://www.suse.com/security/cve/CVE-2018-19985", }, { category: "external", summary: "SUSE Bug 1120743 for CVE-2018-19985", url: "https://bugzilla.suse.com/1120743", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-01T18:55:03Z", details: "low", }, ], title: "CVE-2018-19985", }, { cve: "CVE-2018-20169", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20169", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20169", url: "https://www.suse.com/security/cve/CVE-2018-20169", }, { category: "external", summary: "SUSE Bug 1119714 for CVE-2018-20169", url: "https://bugzilla.suse.com/1119714", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-01T18:55:03Z", details: "moderate", }, ], title: "CVE-2018-20169", }, { cve: "CVE-2018-9568", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-9568", }, ], notes: [ { category: "general", text: "In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-9568", url: "https://www.suse.com/security/cve/CVE-2018-9568", }, { category: "external", summary: "SUSE Bug 1118319 for CVE-2018-9568", url: "https://bugzilla.suse.com/1118319", }, { category: "external", summary: "SUSE Bug 1118320 for CVE-2018-9568", url: "https://bugzilla.suse.com/1118320", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.28.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.28.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.28.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-01T18:55:03Z", details: "important", }, ], title: "CVE-2018-9568", }, ], }
suse-su-2018:3961-1
Vulnerability from csaf_suse
Published
2018-11-30 16:43
Modified
2018-11-30 16:43
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-9363: Fixed an integer overflow that could have been used for an out of bounds write with no additional execution privileges needed. User interaction is not needed for exploitation (bsc#1105292).
- CVE-2018-6555: The irda_setsockopt function in net/irda/af_irda.c was fixed in drivers/staging/irda/net/af_irda.c that allowed local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket (bsc#1106511).
- CVE-2018-6554: Fixed memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c that allowed local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket (bsc#1106509).
- CVE-2018-18710: An information leak was fixed in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c that could have been used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bsc#1113751).
- CVE-2018-18445: Fixed faulty computation of numeric bounds in the BPF verifier that now permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandled 32-bit right shifts (bsc#1112372).
- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c was fixed that was vulnerable to sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations. (bsc#1108399).
- CVE-2018-16658: An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c was fixed that could have leed to be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 (bsc#1107689).
- CVE-2018-15572: The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c was not always fill RSB upon a context switch, which makes it easier for attackers to conduct userspace-userspace spectreRSB attacks. (bsc#1102517)
- CVE-2018-14633: A security flaw was fixed in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely (bsc#1107829).
- CVE-2018-14617: A NULL pointer dereference and panic in hfsplus_lookup() was fixed when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory. (bsc#1102870)
- CVE-2018-14613: An invalid pointer dereference in io_ctl_map_page() was fixed when mounting and operating a crafted btrfs image, because of a lack of block group item validation in check_leaf_item in fs/btrfs/tree-checker.c. (bsc#1102896)
- CVE-2018-13095: A denial of service (memory corruption and BUG) was fixed to prevent a corrupted xfs image upon encountering an inode that is in extent format, but has more extents than fit in the inode fork. (bsc#1099999)
- CVE-2018-13093: A NULL pointer dereference and panic in lookup_slow() on a NULL was fixed to prevent pathwalks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during allocation. (bsc#1100001)
- CVE-2018-12896: An integer overflow in the POSIX timer code was fixed to prevent overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls. (bsc#1099922)
- CVE-2018-1129: The signature calculation was fixed to by the cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable. (bsc#1096748)
- CVE-2018-1128: The cephx authentication protocol was fixed to verify ceph clients correctly and to prevent the vulnerability to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network could have used this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable (bsc#1096748).
- CVE-2018-10940: The cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c was fixed to prevent local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903).
- CVE-2018-10938: A flaw was fixed how the kernel handled network packet sent remotely by an attacker that may forced the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a denial-of-service. A certain non-default configuration of LSM (Linux Security Module) and NetLabel should be set up on a system before an attacker could leverage this flaw. (bsc#1106016)
- CVE-2018-10902: The the raw midi kernel driver was fixed to be protected against concurrent access which could have lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation (bsc#1105322).
- CVE-2017-18224: fs/ocfs2/aops.c omits use of a semaphore and consequently had a race condition for access to the extent tree during read operations in DIRECT mode, which allows local users to cause a denial of service (BUG) by modifying a certain e_cpos field (bsc#1084831).
- CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bsc#1066674).
The following security bug was previously fixed by has now an assigned CVE number:
- CVE-2018-18386: drivers/tty/n_tty.c in the Linux kernel allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).
The following non-security bugs were fixed:
- /dev/mem: Add bounce buffer for copy-out (git-fixes).
- /dev/mem: Avoid overwriting 'err' in read_mem() (git-fixes).
- 9p/net: Fix zero-copy path in the 9p virtio transport (bsc#1051510).
- 9p/virtio: fix off-by-one error in sg list bounds check (bsc#1051510).
- 9p: fix multiple NULL-pointer-dereferences (bsc#1051510).
- ACPI / APEI: Remove ghes_ioremap_area (bsc#1051510).
- ACPI / EC: Add another entry for Thinkpad X1 Carbon 6th (bsc#1051510).
- ACPI / EC: Add parameter to force disable the GPE on suspend (bsc#1051510).
- ACPI / EC: Use ec_no_wakeup on ThinkPad X1 Yoga 3rd (bsc#1051510).
- ACPI / EC: Use ec_no_wakeup on Thinkpad X1 Carbon 6th (bsc#1051510).
- ACPI / EC: Use ec_no_wakeup on more Thinkpad X1 Carbon 6th systems (bsc#1051510).
- ACPI / PCI: pci_link: Allow the absence of _PRS and change log level (bsc#1104172).
- ACPI / PM: save NVS memory for ASUS 1025C laptop (bsc#1051510).
- ACPI / bus: Only call dmi_check_system on X86 (bsc#1105597, bsc#1106178).
- ACPI / processor: Fix the return value of acpi_processor_ids_walk() (bsc#1051510).
- ACPI / scan: Initialize status to ACPI_STA_DEFAULT (bsc#1051510).
- ACPI/IORT: Remove temporary iort_get_id_mapping_index() ACPICA guard (bsc#1103387).
- ACPI/PCI: pci_link: reduce verbosity when IRQ is enabled (bsc#1104172).
- ACPICA: Reference Counts: increase max to 0x4000 for large servers (bsc#1108241).
- ACPICA: iasl: Add SMMUv3 device ID mapping index support (bsc#1103387).
- ALSA: bebob: fix memory leak for M-Audio FW1814 and ProjectMix I/O at error path (bsc#1051510).
- ALSA: bebob: use address returned by kmalloc() instead of kernel stack for streaming DMA mapping (bsc#1051510).
- ALSA: cs46xx: Deliver indirect-PCM transfer error ().
- ALSA: cs5535audio: Fix invalid endian conversion (bsc#1051510).
- ALSA: emu10k1: Deliver indirect-PCM transfer error ().
- ALSA: emu10k1: fix possible info leak to userspace on SNDRV_EMU10K1_IOCTL_INFO (bsc#1051510).
- ALSA: fireface: fix memory leak in ff400_switch_fetching_mode() (bsc#1051510).
- ALSA: firewire-digi00x: fix memory leak of private data (bsc#1051510).
- ALSA: firewire-tascam: fix memory leak of private data (bsc#1051510).
- ALSA: fireworks: fix memory leak of response buffer at error path (bsc#1051510).
- ALSA: hda - Add mic quirk for the Lenovo G50-30 (17aa:3905) (bsc#1051510).
- ALSA: hda - Add quirk for ASUS G751 laptop (bsc#1051510).
- ALSA: hda - Fix cancel_work_sync() stall from jackpoll work (bsc#1051510).
- ALSA: hda - Fix headphone pin config for ASUS G751 (bsc#1051510).
- ALSA: hda - Sleep for 10ms after entering D3 on Conexant codecs (bsc#1051510).
- ALSA: hda - Turn CX8200 into D3 as well upon reboot (bsc#1051510).
- ALSA: hda/realtek - Cannot adjust speaker's volume on Dell XPS 27 7760 (bsc#1051510).
- ALSA: hda/realtek - Fix the problem of the front MIC on the Lenovo M715 (bsc#1051510).
- ALSA: hda: Add 2 more models to the power_save blacklist (bsc#1051510).
- ALSA: hda: Add AZX_DCAPS_PM_RUNTIME for AMD Raven Ridge (bsc#1051510).
- ALSA: hda: Correct Asrock B85M-ITX power_save blacklist entry (bsc#1051510).
- ALSA: hda: fix unused variable warning (bsc#1051510).
- ALSA: memalloc: Do not exceed over the requested size (bsc#1051510).
- ALSA: mips: Deliver indirect-PCM transfer error ().
- ALSA: msnd: Fix the default sample sizes (bsc#1051510).
- ALSA: oxfw: fix memory leak for model-dependent data at error path (bsc#1051510).
- ALSA: oxfw: fix memory leak of discovered stream formats at error path (bsc#1051510).
- ALSA: oxfw: fix memory leak of private data (bsc#1051510).
- ALSA: pcm: Fix negative appl_ptr handling in pcm-indirect helpers ().
- ALSA: pcm: Fix snd_interval_refine first/last with open min/max (bsc#1051510).
- ALSA: pcm: Simplify forward/rewind codes ().
- ALSA: pcm: Use a common helper for PCM state check and hwsync ().
- ALSA: pcm: Workaround for weird PulseAudio behavior on rewind error ().
- ALSA: rme32: Deliver indirect-PCM transfer error ().
- ALSA: usb-audio: Fix multiple definitions in AU0828_DEVICE() macro (bsc#1051510).
- ALSA: usb-audio: update quirk for B W PX to remove microphone (bsc#1051510).
- ALSA: virmidi: Fix too long output trigger loop (bsc#1051510).
- ALSA: vx222: Fix invalid endian conversions (bsc#1051510).
- ALSA: vxpocket: Fix invalid endian conversions (bsc#1051510).
- ARM: 8780/1: ftrace: Only set kernel memory back to read-only after boot (bsc#1051510).
- ARM: 8799/1: mm: fix pci_ioremap_io() offset check (bsc#1051510).
- ARM: DRA7/OMAP5: Enable ACTLR[0] (Enable invalidates of BTB) for secondary cores (bsc#1051510).
- ARM: bcm2835: Add GET_THROTTLED firmware property (bsc#1108468).
- ARM: exynos: Clear global variable on init error path (bsc#1051510).
- ARM: hisi: check of_iomap and fix missing of_node_put (bsc#1051510).
- ARM: hisi: fix error handling and missing of_node_put (bsc#1051510).
- ARM: hisi: handle of_iomap and fix missing of_node_put (bsc#1051510).
- ARM: hwmod: RTC: Do not assume lock/unlock will be called with irq enabled (bsc#1051510).
- ARM: imx: flag failure of of_iomap (bsc#1051510).
- ARM: imx_v4_v5_defconfig: Select ULPI support (bsc#1051510).
- ARM: imx_v6_v7_defconfig: Select ULPI support (bsc#1051510).
- ARM: mvebu: declare asm symbols as character arrays in pmsu.c (bsc#1051510).
- ARM: pxa: irq: fix handling of ICMR registers in suspend/resume (bsc#1051510).
- ASoC: Intel: Skylake: Reset the controller in probe (bsc#1051510).
- ASoC: Intel: cht_bsw_max98090: remove useless code, align with ChromeOS driver (bsc#1051510).
- ASoC: Intel: cht_bsw_max98090_ti: Fix jack initialization (bsc#1051510).
- ASoC: cs4265: fix MMTLR Data switch control (bsc#1051510).
- ASoC: dapm: Fix potential DAI widget pointer deref when linking DAIs (bsc#1051510).
- ASoC: intel: skylake: Add missing break in skl_tplg_get_token() (bsc#1051510).
- ASoC: msm8916-wcd-digital: fix RX2 MIX1 and RX3 MIX1 (bsc#1051510).
- ASoC: rsnd: adg: care clock-frequency size (bsc#1051510).
- ASoC: rsnd: do not fallback to PIO mode when -EPROBE_DEFER (bsc#1051510).
- ASoC: rsnd: fixup not to call clk_get/set under non-atomic (bsc#1051510).
- ASoC: rsnd: move rsnd_ssi_config_init() execute condition into it (bsc#1051510).
- ASoC: rsnd: update pointer more accurate (bsc#1051510).
- ASoC: rt5514: Add the I2S ASRC support (bsc#1051510).
- ASoC: rt5514: Add the missing register in the readable table (bsc#1051510).
- ASoC: rt5514: Eliminate the noise in the ASRC case (bsc#1051510).
- ASoC: rt5514: Fix the issue of the delay volume applied (bsc#1051510).
- ASoC: rt5514: Fix the issue of the delay volume applied again (bsc#1051510).
- ASoC: sigmadsp: safeload should not have lower byte limit (bsc#1051510).
- ASoC: wm8804: Add ACPI support (bsc#1051510).
- ASoC: wm8994: Fix missing break in switch (bsc#1051510).
- Apparmor fixes from git-fixes
- Backport stable-patches for x86 architecture
- Bluetooth: Add a new Realtek 8723DE ID 0bda:b009 (bsc#1051510).
- Bluetooth: Use lock_sock_nested in bt_accept_enqueue (bsc#1051510).
- Bluetooth: avoid killing an already killed socket (bsc#1051510).
- Bluetooth: btsdio: Do not bind to non-removable BCM43430 (bsc#1103587).
- Bluetooth: h5: Fix missing dependency on BT_HCIUART_SERDEV (bsc#1051510).
- Bluetooth: hidp: Fix handling of strncpy for hid->name information (bsc#1051510).
- Bluetooth: hidp: buffer overflow in hidp_process_report (bsc#1051510).
- Btrfs: fix data corruption when deduplicating between different files (bsc#1110647).
- Btrfs: fix duplicate extents after fsync of file with prealloc extents (bsc#1110644).
- Btrfs: fix file data corruption after cloning a range and fsync (bsc#1111901).
- Btrfs: fix fsync after hole punching when using no-holes feature (bsc#1110642).
- Btrfs: fix loss of prealloc extents past i_size after fsync log replay (bsc#1110643).
- Btrfs: fix mount failure after fsync due to hard link recreation (bsc#1103543).
- Btrfs: fix return value on rename exchange failure (bsc#1110645).
- Btrfs: fix send failure when root has deleted files still open (bsc#1110650).
- Btrfs: rework outstanding_extents (dependency for bsc#1031392).
- Btrfs: send, fix invalid access to commit roots due to concurrent snapshotting (bsc#1111904).
- Btrfs: sync log after logging new name (bsc#1110646).
- CIFS: check for STATUS_USER_SESSION_DELETED (bsc#1112902).
- Cleanup out-of-tree subsection
- Disable DRM patches that broke vbox video driver KMP (bsc#1111076)
- Do not leak MNT_INTERNAL away from internal mounts (git-fixes).
- Documentation/l1tf: Fix small spelling typo (bsc#1051510).
- Documentation: add some docs for errseq_t (bsc#1107008).
- Documentation: ip-sysctl.txt: document addr_gen_mode (bsc#1051510).
- Drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bsc#1107207).
- Drivers: hv: vmbus: Add comments on ring buffer signaling (bsc#1107207).
- Drivers: hv: vmbus: Cleanup synic memory free path (bsc#1107207).
- Drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#1107207).
- Drivers: hv: vmbus: Fix the offer_in_progress in vmbus_process_offer() (bsc#1051510).
- Drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1107207).
- Drivers: hv: vmbus: Implement Direct Mode for stimer0 (bsc#1107207).
- Drivers: hv: vmbus: Make TLFS #define names architecture neutral (bsc#1107207).
- Drivers: hv: vmbus: Remove use of slow_virt_to_phys() (bsc#1107207).
- Drivers: hv: vmbus: Remove x86 MSR refs in arch independent code (bsc#1107207).
- Drivers: hv: vmbus: Remove x86-isms from arch independent drivers (bsc#1107207).
- Drivers: hv: vmbus: Removed an unnecessary cast from void * (bsc#1107207).
- Drivers: hv: vmbus: Reset the channel callback in vmbus_onoffer_rescind() (bsc#1107207).
- Drivers: hv: vmbus: Use get/put_cpu() in vmbus_connect() (bsc#1107207).
- Drivers: hv: vmbus: add numa_node to sysfs (bsc#1107207).
- Drivers: hv: vmbus: do not mark HV_PCIE as perf_device (bsc#1051510).
- Drivers: hv: vmbus: enable VMBus protocol version 5.0 (bsc#1107207).
- Drivers: hv: vmbus: respect what we get from hv_get_synint_state() (bsc#1107207).
- Drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bsc#1107207).
- EDAC, ghes: Add DDR4 and NVDIMM memory types (bsc#1099125).
- EDAC, i7core: Fix memleaks and use-after-free on probe and remove (bsc#1051510).
- EDAC, skx: Fix skx_edac build error when ACPI_NFIT=m (bsc#1099125).
- EDAC, skx_edac: Detect non-volatile DIMMs (bsc#1099125).
- EDAC, thunderx: Fix memory leak in thunderx_l2c_threaded_isr() (bsc#1114279).
- EDAC: Add new memory type for non-volatile DIMMs (bsc#1099125).
- EDAC: Fix memleak in module init error path (bsc#1051510).
- EDAC: Raise the maximum number of memory controllers (bsc#1113780).
- Filesystem and FUSE fixes from upstream
- Fix kexec forbidding kernels signed with keys in the secondary keyring to boot (bsc#1110006).
- HID: add quirk for another PIXART OEM mouse used by HP (bsc#1051510).
- HID: add support for Apple Magic Keyboards (bsc#1051510).
- HID: hid-ntrig: add error handling for sysfs_create_group (bsc#1051510).
- HID: hid-saitek: Add device ID for RAT 7 Contagion (bsc#1051510).
- HID: hid-sensor-hub: Force logical minimum to 1 for power and report state (bsc#1051510).
- HID: i2c-hid: Add no-irq-after-reset quirk for 0911:5288 device ().
- HID: quirks: fix support for Apple Magic Keyboards (bsc#1051510).
- HID: sensor-hub: Restore fixup for Lenovo ThinkPad Helix 2 sensor hub report (bsc#1051510).
- IB/IPoIB: Set ah valid flag in multicast send flow (bsc#1046307 ).
- IB/core: type promotion bug in rdma_rw_init_one_mr() (bsc#1046306).
- IB/hfi1: Invalid NUMA node information can cause a divide by zero (bsc#1060463).
- IB/hfi1: Remove incorrect call to do_interrupt callback (bsc#1060463).
- IB/hfi1: Set in_use_ctxts bits for user ctxts only (bsc#1060463 ).
- IB/ipoib: Avoid a race condition between start_xmit and cm_rep_handler (bsc#1046307).
- IB/ipoib: Fix error return code in ipoib_dev_init() (bsc#1046307 ).
- IB/mlx4: Test port number before querying type (bsc#1046302 ).
- IB/mlx4: Use 4K pages for kernel QP's WQE buffer (bsc#1046302 ).
- IB/mlx5: fix uaccess beyond 'count' in debugfs read/write handlers (bsc#1046305).
- Input: atakbd - fix Atari CapsLock behaviour (bsc#1051510).
- Input: atakbd - fix Atari keymap (bsc#1051510).
- Input: atmel_mxt_ts - only use first T9 instance (bsc#1051510).
- Input: edt-ft5x06 - fix error handling for factory mode on non-M06 (bsc#1051510).
- Input: edt-ft5x06 - implement support for the EDT-M12 series (bsc#1051510).
- Input: edt-ft5x06 - make distinction between m06/m09/generic more clear (bsc#1051510).
- Input: elantech - enable middle button of touchpad on ThinkPad P72 (bsc#1051510).
- Input: synaptics-rmi4 - fix axis-swap behavior (bsc#1051510).
- KABI: hide new member in struct iommu_table from genksyms (bsc#1061840).
- KABI: move the new handler to end of machdep_calls and hide it from genksyms (bsc#1094244).
- KABI: powerpc: export __find_linux_pte as __find_linux_pte_or_hugepte (bsc#1061840).
- KABI: tpm: change relinquish_locality return value back to void (bsc#1082555).
- KABI: tpm: do keep the cmd_ready and go_idle as pm ops (bsc#1082555).
- KVM/VMX: Optimize vmx_vcpu_run() and svm_vcpu_run() by marking the RDMSR path as unlikely() (bsc#1110006).
- KVM/x86: remove WARN_ON() for when vm_munmap() fails (bsc#1106240).
- KVM: Enforce error in ioctl for compat tasks when !KVM_COMPAT (bsc#1106240).
- KVM: PPC: Add pt_regs into kvm_vcpu_arch and move vcpu->arch.gpr[] into it (bsc#1061840).
- KVM: PPC: Avoid marking DMA-mapped pages dirty in real mode (bsc#1061840).
- KVM: PPC: Book 3S HV: Do ptesync in radix guest exit path (bsc#1061840).
- KVM: PPC: Book3S HV: Add 'online' register to ONE_REG interface (bsc#1061840).
- KVM: PPC: Book3S HV: Add of_node_put() in success path (bsc#1061840).
- KVM: PPC: Book3S HV: Allow HPT and radix on the same core for POWER9 v2.2 (bsc#1061840).
- KVM: PPC: Book3S HV: Allow creating max number of VCPUs on POWER9 (bsc#1061840).
- KVM: PPC: Book3S HV: Avoid crash from THP collapse during radix page fault (bsc#1061840).
- KVM: PPC: Book3S HV: Avoid shifts by negative amounts (bsc#1061840).
- KVM: PPC: Book3S HV: Check DR not IR to chose real vs virt mode MMIOs (bsc#1061840).
- KVM: PPC: Book3S HV: Do SLB load/unload with guest LPCR value loaded (bsc#1061840).
- KVM: PPC: Book3S HV: Do not truncate HPTE index in xlate function (bsc#1061840).
- KVM: PPC: Book3S HV: Do not use compound_order to determine host mapping size (bsc#1061840).
- KVM: PPC: Book3S HV: Do not use existing 'prodded' flag for XIVE escalations (bsc#1061840).
- KVM: PPC: Book3S HV: Enable migration of decrementer register (bsc#1061840).
- KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm (bsc#1061840).
- KVM: PPC: Book3S HV: Fix VRMA initialization with 2MB or 1GB memory backing (bsc#1061840).
- KVM: PPC: Book3S HV: Fix conditions for starting vcpu (bsc#1061840).
- KVM: PPC: Book3S HV: Fix constant size warning (bsc#1061840).
- KVM: PPC: Book3S HV: Fix duplication of host SLB entries (bsc#1061840).
- KVM: PPC: Book3S HV: Fix guest r11 corruption with POWER9 TM workarounds (bsc#1061840).
- KVM: PPC: Book3S HV: Fix handling of large pages in radix page fault handler (bsc#1061840).
- KVM: PPC: Book3S HV: Fix handling of secondary HPTEG in HPT resizing code (bsc#1061840).
- KVM: PPC: Book3S HV: Fix inaccurate comment (bsc#1061840).
- KVM: PPC: Book3S HV: Fix kvmppc_bad_host_intr for real mode interrupts (bsc#1061840).
- KVM: PPC: Book3S HV: Fix trap number return from __kvmppc_vcore_entry (bsc#1061840).
- KVM: PPC: Book3S HV: Fix typo in kvmppc_hv_get_dirty_log_radix() (bsc#1061840).
- KVM: PPC: Book3S HV: Handle 1GB pages in radix page fault handler (bsc#1061840).
- KVM: PPC: Book3S HV: Improve handling of debug-trigger HMIs on POWER9 (bsc#1061840).
- KVM: PPC: Book3S HV: Keep XIVE escalation interrupt masked unless ceded (bsc#1061840).
- KVM: PPC: Book3S HV: Lockless tlbie for HPT hcalls (bsc#1061840).
- KVM: PPC: Book3S HV: Make HPT resizing work on POWER9 (bsc#1061840).
- KVM: PPC: Book3S HV: Make radix clear pte when unmapping (bsc#1061840).
- KVM: PPC: Book3S HV: Make radix use correct tlbie sequence in kvmppc_radix_tlbie_page (bsc#1061840).
- KVM: PPC: Book3S HV: Make xive_pushed a byte, not a word (bsc#1061840).
- KVM: PPC: Book3S HV: Pack VCORE IDs to access full VCPU ID space (bsc#1061840).
- KVM: PPC: Book3S HV: Radix page fault handler optimizations (bsc#1061840).
- KVM: PPC: Book3S HV: Read kvm->arch.emul_smt_mode under kvm->lock (bsc#1061840).
- KVM: PPC: Book3S HV: Recursively unmap all page table entries when unmapping (bsc#1061840).
- KVM: PPC: Book3S HV: Remove useless statement (bsc#1061840).
- KVM: PPC: Book3S HV: Remove vcpu->arch.dec usage (bsc#1061840).
- KVM: PPC: Book3S HV: Send kvmppc_bad_interrupt NMIs to Linux handlers (bsc#1061840).
- KVM: PPC: Book3S HV: Set RWMR on POWER8 so PURR/SPURR count correctly (bsc#1061840).
- KVM: PPC: Book3S HV: Snapshot timebase offset on guest entry (bsc#1061840).
- KVM: PPC: Book3S HV: Streamline setting of reference and change bits (bsc#1061840).
- KVM: PPC: Book3S HV: Use __gfn_to_pfn_memslot() in page fault handler (bsc#1061840).
- KVM: PPC: Book3S HV: Use a helper to unmap ptes in the radix fault path (bsc#1061840).
- KVM: PPC: Book3S HV: Use correct pagesize in kvm_unmap_radix() (bsc#1061840, git-fixes).
- KVM: PPC: Book3S HV: XIVE: Resend re-routed interrupts on CPU priority change (bsc#1061840).
- KVM: PPC: Book3S HV: radix: Do not clear partition PTE when RC or write bits do not match (bsc#1061840).
- KVM: PPC: Book3S HV: radix: Refine IO region partition scope attributes (bsc#1061840).
- KVM: PPC: Book3S PR: Add guest MSR parameter for kvmppc_save_tm()/kvmppc_restore_tm() (bsc#1061840).
- KVM: PPC: Book3S PR: Move kvmppc_save_tm/kvmppc_restore_tm to separate file (bsc#1061840).
- KVM: PPC: Book3S: Add MMIO emulation for VMX instructions (bsc#1061840).
- KVM: PPC: Book3S: Allow backing bigger guest IOMMU pages with smaller physical pages (bsc#1061840).
- KVM: PPC: Book3S: Check KVM_CREATE_SPAPR_TCE_64 parameters (bsc#1061840).
- KVM: PPC: Book3S: Eliminate some unnecessary checks (bsc#1061840).
- KVM: PPC: Book3S: Fix compile error that occurs with some gcc versions (bsc#1061840).
- KVM: PPC: Book3S: Fix guest DMA when guest partially backed by THP pages (bsc#1077761, git-fixes, bsc#1103948, bsc#1103949).
- KVM: PPC: Book3S: Fix matching of hardware and emulated TCE tables (bsc#1061840).
- KVM: PPC: Book3S: Use correct page shift in H_STUFF_TCE (bsc#1061840).
- KVM: PPC: Fix a mmio_host_swabbed uninitialized usage issue (bsc#1061840).
- KVM: PPC: Make iommu_table::it_userspace big endian (bsc#1061840).
- KVM: PPC: Move nip/ctr/lr/xer registers to pt_regs in kvm_vcpu_arch (bsc#1061840).
- KVM: PPC: Use seq_puts() in kvmppc_exit_timing_show() (bsc#1061840).
- KVM: SVM: Add MSR-based feature support for serializing LFENCE (bsc#1106240).
- KVM: VMX: Do not allow reexecute_instruction() when skipping MMIO instr (bsc#1106240).
- KVM: VMX: Tell the nested hypervisor to skip L1D flush on vmentry (bsc#1106240).
- KVM: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).
- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).
- KVM: VMX: raise internal error for exception during invalid protected mode state (bsc#1110006).
- KVM: VMX: support MSR_IA32_ARCH_CAPABILITIES as a feature MSR (bsc#1106240).
- KVM: X86: Fix reserved bits check for MOV to CR3 (bsc#1110006).
- KVM: X86: Introduce kvm_get_msr_feature() (bsc#1106240).
- KVM: X86: fix incorrect reference of trace_kvm_pi_irte_update (bsc#1110006).
- KVM: hyperv: idr_find needs RCU protection (bsc#1107207).
- KVM: introduce kvm_make_vcpus_request_mask() API (bsc#1107207).
- KVM: lapic: stop advertising DIRECTED_EOI when in-kernel IOAPIC is in use (bsc#1110006).
- KVM: nVMX: Do not expose MPX VMX controls when guest MPX disabled (bsc#1106240).
- KVM: nVMX: Do not flush TLB when vmcs12 uses VPID (bsc#1106240).
- KVM: nVMX: Do not halt vcpu when L1 is injecting events to L2 (bsc#1110006).
- KVM: nVMX: Fix injection to L2 when L1 do not intercept external-interrupts (bsc#1106240).
- KVM: nVMX: Fix races when sending nested PI while dest enters/leaves L2 (bsc#1106240).
- KVM: nVMX: Re-evaluate L1 pending events when running L2 and L1 got posted-interrupt (bsc#1106240).
- KVM: s390: add etoken support for guests (bsc#1106948, LTC#171029).
- KVM: s390: force bp isolation for VSIE (bsc#1103421).
- KVM: s390: implement CPU model only facilities (bsc#1106948, LTC#171029).
- KVM: vmx: track host_state.loaded using a loaded_vmcs pointer (bsc#1110006).
- KVM: vmx: use local variable for current_vmptr when emulating VMPTRST (bsc#1110006).
- KVM: x86: Add a framework for supporting MSR-based features (bsc#1106240).
- KVM: x86: Change __kvm_apic_update_irr() to also return if max IRR updated (bsc#1106240).
- KVM: x86: Default to not allowing emulation retry in kvm_mmu_page_fault (bsc#1106240).
- KVM: x86: Do not re-{try,execute} after failed emulation in L2 (bsc#1106240).
- KVM: x86: Do not use kvm_x86_ops->mpx_supported() directly (bsc#1106240).
- KVM: x86: Invert emulation re-execute behavior to make it opt-in (bsc#1106240).
- KVM: x86: Merge EMULTYPE_RETRY and EMULTYPE_ALLOW_REEXECUTE (bsc#1106240).
- KVM: x86: SVM: Call x86_spec_ctrl_set_guest/host() with interrupts disabled (git-fixes 1f50ddb4f418).
- KVM: x86: Update cpuid properly when CR4.OSXAVE or CR4.PKE is changed (bsc#1110006).
- KVM: x86: VMX: hyper-v: Enlightened MSR-Bitmap support (bsc#1107207).
- KVM: x86: define SVM/VMX specific kvm_arch_[alloc|free]_vm (bsc#1111506).
- KVM: x86: ensure all MSRs can always be KVM_GET/SET_MSR'd (bsc#1107207).
- KVM: x86: fix #UD address of failed Hyper-V hypercalls (bsc#1107207).
- KVM: x86: fix #UD address of failed Hyper-V hypercalls (bsc#1110006).
- KVM: x86: fix APIC page invalidation (bsc#1106240).
- KVM: x86: fix escape of guest dr6 to the host (bsc#1110006).
- KVM: x86: hyperv: do rep check for each hypercall separately (bsc#1107207).
- KVM: x86: hyperv: simplistic HVCALL_FLUSH_VIRTUAL_ADDRESS_{LIST,SPACE} implementation (bsc#1107207).
- KVM: x86: hyperv: simplistic HVCALL_FLUSH_VIRTUAL_ADDRESS_{LIST,SPACE}_EX implementation (bsc#1107207).
- KVM: x86: hyperv: use defines when parsing hypercall parameters (bsc#1107207).
- KVM: x86: remove APIC Timer periodic/oneshot spikes (bsc#1110006).
- Kbuild: fix # escaping in .cmd files for future Make (git-fixes).
- Limit kernel-source build to architectures for which we build binaries (bsc#1108281).
- MAINTAINERS: fix location of ina2xx.txt device tree file (bsc#1051510).
- NET: stmmac: align DMA stuff to largest cache line length (netfilter-stable-18_08_01).
- NFC: Fix possible memory corruption when handling SHDLC I-Frame commands (bsc#1051510).
- NFC: nfcmrvl_uart: fix OF child-node lookup (bsc#1051510).
- NFC: trf7970a: fix check of clock frequencies (bsc#1051510).
- NFS/filelayout: Fix racy setting of fl->dsaddr in filelayout_check_deviceid() (bsc#1105190).
- NFS: Avoid quadratic search when freeing delegations (bsc#1084760).
- NFS: Use an appropriate work queue for direct-write completion (bsc#1082519).
- NFSv4 client live hangs after live data migration recovery (git-fixes).
- NFSv4: Fix a sleep in atomic context in nfs4_callback_sequence() (git-fixes).
- NFSv4: Fix possible 1-byte stack overflow in nfs_idmap_read_and_verify_message (git-fixes).
- Netperf performance issue due to AppArmor net mediation (bsc#1108520)
- PCI/ASPM: Fix link_state teardown on device removal (bsc#1051510).
- PCI/portdrv: Compute MSI/MSI-X IRQ vectors after final allocation (bsc#1109806).
- PCI/portdrv: Factor out Interrupt Message Number lookup (bsc#1109806).
- PCI: Add PCI resource type mask #define (bsc#1105355).
- PCI: Add pci_resize_resource() for resizing BARs (bsc#1105355).
- PCI: Add resizable BAR infrastructure (bsc#1105355).
- PCI: Allow release of resources that were never assigned (bsc#1105355).
- PCI: Cleanup PCI_REBAR_CTRL_BAR_SHIFT handling (bsc#1105355).
- PCI: Match Root Port's MPS to endpoint's MPSS as necessary (bsc#1109269).
- PCI: OF: Fix I/O space page leak (git-fixes).
- PCI: Reprogram bridge prefetch registers on resume (bsc#1051510).
- PCI: Restore resized BAR state on resume (bsc#1105355).
- PCI: Skip MPS logic for Virtual Functions (VFs) (bsc#1051510).
- PCI: aardvark: Fix I/O space page leak (git-fixes).
- PCI: aardvark: Size bridges before resources allocation (bsc#1109806).
- PCI: designware: Fix I/O space page leak (bsc#1109806).
- PCI: dwc: Fix scheduling while atomic issues (git-fixes).
- PCI: faraday: Add missing of_node_put() (bsc#1109806).
- PCI: faraday: Fix I/O space page leak (bsc#1109806).
- PCI: hotplug: Do not leak pci_slot on registration failure (bsc#1051510).
- PCI: hv: Convert remove_lock to refcount (bsc#1107207).
- PCI: hv: Do not wait forever on a device that has disappeared (bsc#1107207).
- PCI: hv: Do not wait forever on a device that has disappeared (bsc#1109806).
- PCI: hv: Fix return value check in hv_pci_assign_slots() (bsc#1107207).
- PCI: hv: Make sure the bus domain is really unique (git-fixes).
- PCI: hv: Remove unused reason for refcount handler (bsc#1107207).
- PCI: hv: Replace GFP_ATOMIC with GFP_KERNEL in new_pcichild_device() (bsc#1107207).
- PCI: hv: Use effective affinity mask (bsc#1107207).
- PCI: hv: Use list_for_each_entry() (bsc#1107207).
- PCI: hv: support reporting serial number as slot information (bsc#1107207).
- PCI: mvebu: Fix I/O space end address calculation (bsc#1051510).
- PCI: pciehp: Fix unprotected list iteration in IRQ handler (bsc#1051510).
- PCI: pciehp: Fix use-after-free on unplug (bsc#1051510).
- PCI: versatile: Fix I/O space page leak (bsc#1109806).
- PCI: xgene: Fix I/O space page leak (bsc#1109806).
- PCI: xilinx-nwl: Add missing of_node_put() (bsc#1109806).
- PCI: xilinx: Add missing of_node_put() (bsc#1109806).
- PM / Domains: Fix error path during attach in genpd (bsc#1051510).
- PM / Domains: Fix genpd to deal with drivers returning 1 from ->prepare() (bsc#1051510).
- PM / clk: signedness bug in of_pm_clk_add_clks() (bsc#1051510).
- PM / core: Clear the direct_complete flag on errors (bsc#1051510).
- PM / runtime: Drop usage count for suppliers at device link removal (bsc#1100132).
- PM / sleep: wakeup: Fix build error caused by missing SRCU support (bsc#1051510).
- PM: cpuidle: Fix cpuidle_poll_state_init() prototype (bsc#1110006).
- RAID10 BUG_ON in raise_barrier when force is true and conf->barrier is 0 (git-fixes).
- RDMA/bnxt_re: Fix a bunch of off by one bugs in qplib_fp.c (bsc#1050244).
- RDMA/bnxt_re: Fix a couple off by one bugs (bsc#1050244 ).
- RDMA/bnxt_re: Fix system crash during RDMA resource initialization (bsc#1086283).
- RDMA/i40w: Hold read semaphore while looking after VMA (bsc#1058659).
- RDMA/uverbs: Expand primary and alt AV port checks (bsc#1046306 ).
- Squashfs: Compute expected length from inode size rather than block length (bsc#1051510).
- Tools: hv: Fix a bug in the key delete code (bsc#1107207).
- USB: Add quirk to support DJI CineSSD (bsc#1051510).
- USB: add quirk for WORLDE Controller KS49 or Prodipe MIDI 49C USB controller (bsc#1051510).
- USB: cdc-wdm: do not enable interrupts in USB-giveback (bsc#1051510).
- USB: fix error handling in usb_driver_claim_interface() (bsc#1051510).
- USB: handle NULL config in usb_find_alt_setting() (bsc#1051510).
- USB: net2280: Fix erroneous synchronization change (bsc#1051510).
- USB: option: add support for DW5821e (bsc#1051510).
- USB: remove LPM management from usb_driver_claim_interface() (bsc#1051510).
- USB: serial: cypress_m8: fix interrupt-out transfer length (bsc#1051510).
- USB: serial: io_ti: fix array underflow in completion handler (bsc#1051510).
- USB: serial: kobil_sct: fix modem-status error handling (bsc#1051510).
- USB: serial: pl2303: add a new device id for ATEN (bsc#1051510).
- USB: serial: sierra: fix potential deadlock at close (bsc#1051510).
- USB: serial: simple: add Motorola Tetra MTP6550 id (bsc#1051510).
- USB: serial: ti_usb_3410_5052: fix array underflow in completion handler (bsc#1051510).
- USB: yurex: Check for truncation in yurex_read() (bsc#1051510).
- USB: yurex: Fix buffer over-read in yurex_write() (bsc#1051510).
- Update config files, make CRYPTO_CRCT10DIF_PCLMUL built-in (bsc#1105603).
- VFS: do not test owner for NFS in set_posix_acl() (bsc#1103405).
- Workaround for mysterious NVMe breakage with i915 CFL (bsc#1111040).
- Workaround kABI breakage by __must_check drop of strscpy() (bsc#1051510).
- X86/Hyper-V: Add flush HvFlushGuestPhysicalAddressSpace hypercall support (bsc#1107207).
- X86/Hyper-V: Add hyperv_nested_flush_guest_mapping ftrace support (bsc#1107207).
- X86/Hyper-V: Consolidate code for converting cpumask to vpset (bsc#1107207).
- X86/Hyper-V: Consolidate the allocation of the hypercall input page (bsc#1107207).
- X86/Hyper-V: Enable IPI enlightenments (bsc#1107207).
- X86/Hyper-V: Enhanced IPI enlightenment (bsc#1107207).
- X86/Hyper-V: Enlighten APIC access (bsc#1107207).
- acpi, nfit: Add function to look up nvdimm device and provide SMBIOS handle (bsc#1099125).
- affs_lookup(): close a race with affs_remove_link() (bsc#1105355).
- ahci: Add Intel Ice Lake LP PCI ID (bsc#1051510).
- aio: fix io_destroy(2) vs. lookup_ioctx() race (git-fixes).
- apparmor: Check buffer bounds when mapping permissions mask (git-fixes).
- apparmor: Fix failure to audit context info in build_change_hat (bsc#1051510).
- apparmor: Fix regression in profile conflict logic (bsc#1106427)
- apparmor: Fully initialize aa_perms struct when answering userspace query (bsc#1051510).
- apparmor: ensure that undecidable profile attachments fail (bsc#1106427).
- apparmor: fix an error code in __aa_create_ns() (bsc#1106427).
- apparmor: fix mediation of prlimit (bsc#1051510).
- apparmor: fix memory leak when deduping profile load (bsc#1051510).
- apparmor: fix ptrace read check (bsc#1051510).
- apparmor: remove no-op permission check in policy_unpack (bsc#1106427).
- arm/asm/tlb.h: Fix build error implicit func declaration (bsc#1105467 Reduce IPIs and atomic ops with improved lazy TLB).
- arm64/acpi: Create arch specific cpu to acpi id helper (bsc#1106903).
- arm64/kasan: do not allocate extra shadow memory (bsc#1106897).
- arm64/mm/kasan: do not use vmemmap_populate() to initialize shadow (bsc#1106898).
- arm64: Enforce BBM for huge IO/VMAP mappings (bsc#1106890).
- arm64: Ignore hardware dirty bit updates in ptep_set_wrprotect() (bsc#1108010).
- arm64: Make sure permission updates happen for pmd/pud (bsc#1106891).
- arm64: dma-mapping: clear buffers allocated with FORCE_CONTIGUOUS flag (bsc#1106902).
- arm64: enable thunderx gpio driver
- arm64: export memblock_reserve()d regions via /proc/iomem (bsc#1106892).
- arm64: fix unwind_frame() for filtered out fn for function graph tracing (bsc#1106900).
- arm64: fix vmemmap BUILD_BUG_ON() triggering on !vmemmap setups (bsc#1106896).
- arm64: fpsimd: Avoid FPSIMD context leakage for the init task (bsc#1106894).
- arm64: kasan: avoid pfn_to_nid() before page array is initialized (bsc#1106899).
- arm64: mm: Ensure writes to swapper are ordered wrt subsequent cache maintenance (bsc#1106906).
- arm64: mm: check for upper PAGE_SHIFT bits in pfn_valid() (bsc#1106893).
- arm64: move patches to sorted section
- arm64: numa: rework ACPI NUMA initialization (bsc#1106905).
- arm64: vgic-v2: Fix proxying of cpuif access (bsc#1106901).
- asix: Check for supported Wake-on-LAN modes (bsc#1051510).
- ata: Fix ZBC_OUT all bit handling (bsc#1051510).
- ata: Fix ZBC_OUT command block check (bsc#1051510).
- ata: libahci: Allow reconfigure of DEVSLP register (bsc#1051510).
- ata: libahci: Correct setting of DEVSLP register (bsc#1051510).
- ath10k: disable bundle mgmt tx completion event support (bsc#1051510).
- ath10k: fix kernel panic issue during pci probe (bsc#1051510).
- ath10k: fix scan crash due to incorrect length calculation (bsc#1051510).
- ath10k: fix use-after-free in ath10k_wmi_cmd_send_nowait (bsc#1051510).
- ath10k: prevent active scans on potential unusable channels (bsc#1051510).
- ath10k: protect ath10k_htt_rx_ring_free with rx_ring.lock (bsc#1051510).
- ath10k: update the phymode along with bandwidth change request (bsc#1051510).
- ath9k: add MSI support ().
- ath9k: report tx status on EOSP (bsc#1051510).
- ath9k_hw: fix channel maximum power level test (bsc#1051510).
- atm: Preserve value of skb->truesize when accounting to vcc (networking-stable-18_07_19).
- atm: horizon: Fix irq release error (bsc#1105355).
- atm: zatm: Fix potential Spectre v1 (networking-stable-18_07_19).
- atm: zatm: fix memcmp casting (bsc#1105355).
- audit: Fix extended comparison of GID/EGID (bsc#1051510).
- audit: allow not equal op for audit by executable (bsc#1051510).
- audit: fix use-after-free in audit_add_watch (bsc#1051510).
- autofs: fix autofs_sbi() does not check super block type (git-fixes).
- autofs: fix slab out of bounds read in getname_kernel() (git-fixes).
- autofs: mount point create should honour passed in mode (git-fixes).
- ax88179_178a: Check for supported Wake-on-LAN modes (bsc#1051510).
- b43/leds: Ensure NUL-termination of LED name string (bsc#1051510).
- b43legacy/leds: Ensure NUL-termination of LED name string (bsc#1051510).
- badblocks: fix wrong return value in badblocks_set if badblocks are disabled (git-fixes).
- batman-adv: Avoid probe ELP information leak (bsc#1051510).
- batman-adv: Fix multicast TT issues with bogus ROAM flags (bsc#1051510).
- batman-adv: Fix segfault when writing to sysfs elp_interval (bsc#1051510).
- batman-adv: Fix segfault when writing to throughput_override (bsc#1051510).
- batman-adv: Prevent duplicated gateway_node entry (bsc#1051510).
- batman-adv: Prevent duplicated global TT entry (bsc#1051510).
- batman-adv: Prevent duplicated nc_node entry (bsc#1051510).
- batman-adv: Prevent duplicated softif_vlan entry (bsc#1051510).
- batman-adv: Prevent duplicated tvlv handler (bsc#1051510).
- batman-adv: fix backbone_gw refcount on queue_work() failure (bsc#1051510).
- batman-adv: fix hardif_neigh refcount on queue_work() failure (bsc#1051510).
- bcache: avoid unncessary cache prefetch bch_btree_node_get().
- bcache: calculate the number of incremental GC nodes according to the total of btree nodes.
- bcache: display rate debug parameters to 0 when writeback is not running.
- bcache: do not check return value of debugfs_create_dir().
- bcache: finish incremental GC.
- bcache: fix I/O significant decline while backend devices registering.
- bcache: fix error setting writeback_rate through sysfs interface.
- bcache: free heap cache_set->flush_btree in bch_journal_free.
- bcache: make the pr_err statement used for ENOENT only in sysfs_attatch section.
- bcache: release dc->writeback_lock properly in bch_writeback_thread().
- bcache: set max writeback rate when I/O request is idle.
- bcache: simplify the calculation of the total amount of flash dirty data.
- bdi: Fix another oops in wb_workfn() (bsc#1112746).
- bdi: Preserve kabi when adding cgwb_release_mutex (bsc#1112746).
- be2net: Fix memory leak in be_cmd_get_profile_config() (bsc#1086288).
- be2net: remove unused old AIC info (bsc#1086288).
- be2net: remove unused old custom busy-poll fields (bsc#1086288 ).
- binfmt_elf: Respect error return from `regset->active' (bsc#1051510).
- blk-mq: I/O and timer unplugs are inverted in blktrace (bsc#1112713).
- blk-mq: avoid to synchronize rcu inside blk_cleanup_queue() (bsc#1077989).
- blkdev: __blkdev_direct_IO_simple: fix leak in error case (bsc#1083663).
- blkdev_report_zones_ioctl(): Use vmalloc() to allocate large buffers (bsc#1111819).
- block, bfq: fix wrong init of saved start time for weight raising (bsc#1112708).
- block, bfq: return nbytes and not zero from struct cftype .write() method (bsc#1106238).
- block, dax: remove dead code in blkdev_writepages() (bsc#1104888).
- block: Invalidate cache on discard v2 (bsc#1109992).
- block: bfq: swap puts in bfqg_and_blkg_put (bsc#1112712).
- block: bio_iov_iter_get_pages: fix size of last iovec (bsc#1083663).
- block: bio_iov_iter_get_pages: pin more pages for multi-segment IOs (bsc#1083663).
- block: bvec_nr_vecs() returns value for wrong slab (bsc#1111834).
- block: do not print a message when the device went away (bsc#1098459).
- block: do not warn for flush on read-only device (bsc#1107756).
- block: fix warning when I/O elevator is changed as request_queue is being removed (bsc#1109979).
- block: pass inclusive 'lend' parameter to truncate_inode_pages_range (bsc#1109992).
- block: properly protect the 'queue' kobj in blk_unregister_queue (bsc#1109979).
- bnx2x: Fix invalid memory access in rss hash config path (bsc#1050319).
- bnx2x: Fix receiving tx-timeout in error or recovery state (bsc#1050319).
- bnxt_en: Clean up unused functions (bsc#1086282).
- bnxt_en: Do not adjust max_cp_rings by the ones used by RDMA (bsc#1086282).
- bnxt_en: Fix VF mac address regression (bsc#1086282 ).
- bnxt_re: Fix couple of memory leaks that could lead to IOMMU call traces (bsc#1050244).
- bonding: avoid lockdep confusion in bond_get_stats() (netfilter-stable-18_08_04).
- bpf, s390: fix potential memleak when later bpf_jit_prog fails (bsc#1083647).
- bpf/verifier: disallow pointer subtraction (bsc#1083647).
- bpf: fix references to free_bpf_prog_info() in comments (bsc#1083647).
- bpf: fix uninitialized variable in bpf tools (bsc#1083647).
- bpf: hash map: decrement counter on error (bsc#1083647).
- bpf: make cavium thunder compatible w/ bpf_xdp_adjust_tail (bsc#1110096).
- bpf: powerpc64: pad function address loads with NOPs (bsc#1083647).
- bpf: use GFP_ATOMIC instead of GFP_KERNEL in bpf_parse_prog() (bsc#1083647).
- brcmfmac: stop watchdog before detach and free everything (bsc#1051510).
- brcmsmac: fix wrap around in conversion from constant to s16 (bsc#1051510).
- btrfs: Add checker for EXTENT_CSUM (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: Add sanity check for EXTENT_DATA when reading out leaf (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: Check if item pointer overlaps with the item itself (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: Check that each block group has corresponding chunk at mount time (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667).
- btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).
- btrfs: Fix use-after-free when cleaning up fs_devs with a single stale device (bsc#1097105).
- btrfs: Fix wrong btrfs_delalloc_release_extents parameter (bsc#1031392).
- btrfs: Handle error from btrfs_uuid_tree_rem call in _btrfs_ioctl_set_received_subvol (bsc#1097105).
- btrfs: Introduce mount time chunk dev extent mapping check (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: Manually implement device_total_bytes getter/setter (bsc#1043912).
- btrfs: Move leaf and node validation checker to tree-checker.c (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: Remove unused parameters from various functions (bsc#1110649).
- btrfs: Round down values which are written for total_bytes_size (bsc#1043912).
- btrfs: Verify that every chunk has corresponding block group at mount time (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: add a comp_refs() helper (dependency for bsc#1031392).
- btrfs: add tracepoints for outstanding extents mods (dependency for bsc#1031392).
- btrfs: check-integrity: Fix NULL pointer dereference for degraded mount (bsc#1107947).
- btrfs: cleanup extent locking sequence (dependency for bsc#1031392).
- btrfs: delayed-inode: Remove wrong qgroup meta reservation calls (bsc#1031392).
- btrfs: delayed-inode: Use new qgroup meta rsv for delayed inode and item (bsc#1031392).
- btrfs: fix error handling in btrfs_dev_replace_start (bsc#1107535).
- btrfs: fix missing error return in btrfs_drop_snapshot (Git-fixes bsc#1109919).
- btrfs: handle errors while updating refcounts in update_ref_for_cow (Git-fixes bsc#1109915).
- btrfs: log csums for all modified extents (bsc#1110639).
- btrfs: make the delalloc block rsv per inode (dependency for bsc#1031392).
- btrfs: qgroup: Add quick exit for non-fs extents (dependency for bsc#1031392).
- btrfs: qgroup: Cleanup btrfs_qgroup_prepare_account_extents function (dependency for bsc#1031392).
- btrfs: qgroup: Cleanup the remaining old reservation counters (bsc#1031392).
- btrfs: qgroup: Commit transaction in advance to reduce early EDQUOT (bsc#1031392).
- btrfs: qgroup: Do not use root->qgroup_meta_rsv for qgroup (bsc#1031392).
- btrfs: qgroup: Fix qgroup reserved space underflow by only freeing reserved ranges (dependency for bsc#1031392).
- btrfs: qgroup: Fix qgroup reserved space underflow caused by buffered write and quotas being enabled (dependency for bsc#1031392).
- btrfs: qgroup: Fix wrong qgroup reservation update for relationship modification (bsc#1031392).
- btrfs: qgroup: Introduce extent changeset for qgroup reserve functions (dependency for bsc#1031392).
- btrfs: qgroup: Introduce function to convert META_PREALLOC into META_PERTRANS (bsc#1031392).
- btrfs: qgroup: Introduce helpers to update and access new qgroup rsv (bsc#1031392).
- btrfs: qgroup: Make qgroup_reserve and its callers to use separate reservation type (bsc#1031392).
- btrfs: qgroup: Return actually freed bytes for qgroup release or free data (dependency for bsc#1031392).
- btrfs: qgroup: Skeleton to support separate qgroup reservation type (bsc#1031392).
- btrfs: qgroup: Split meta rsv type into meta_prealloc and meta_pertrans (bsc#1031392).
- btrfs: qgroup: Update trace events for metadata reservation (bsc#1031392).
- btrfs: qgroup: Update trace events to use new separate rsv types (bsc#1031392).
- btrfs: qgroup: Use independent and accurate per inode qgroup rsv (bsc#1031392).
- btrfs: qgroup: Use root::qgroup_meta_rsv_* to record qgroup meta reserved space (bsc#1031392).
- btrfs: qgroup: Use separate meta reservation type for delalloc (bsc#1031392).
- btrfs: remove type argument from comp_tree_refs (dependency for bsc#1031392).
- btrfs: round down size diff when shrinking/growing device (bsc#1097105).
- btrfs: scrub: Do not use inode page cache in scrub_handle_errored_block() (follow up for bsc#1108096).
- btrfs: scrub: Do not use inode pages for device replace (follow up for bsc#1108096).
- btrfs: switch args for comp_*_refs (dependency for bsc#1031392).
- btrfs: tests/qgroup: Fix wrong tree backref level (bsc#1107928).
- btrfs: tree-checker: Add checker for dir item (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Detect invalid and empty essential trees (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Enhance btrfs_check_node output (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Enhance output for btrfs_check_leaf (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Enhance output for check_csum_item (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Enhance output for check_extent_data_item (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Fix false panic for sanity test (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Replace root parameter with fs_info (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: Verify block_group_item (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: use %zu format string for size_t (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- btrfs: tree-checker: use %zu format string for size_t (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).
- cdc-acm: fix race between reset and control messaging (bsc#1051510).
- cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status (bsc#1051510).
- ceph: avoid a use-after-free in ceph_destroy_options() (bsc#1111983).
- ceph: fix incorrect use of strncpy (bsc#1107319).
- ceph: return errors from posix_acl_equiv_mode() correctly (bsc#1107320).
- cfg80211: fix a type issue in ieee80211_chandef_to_operating_class() (bsc#1051510).
- cfg80211: nl80211_update_ft_ies() to validate NL80211_ATTR_IE (bsc#1051510).
- cfg80211: reg: Init wiphy_idx in regulatory_hint_core() (bsc#1051510).
- cgroup: avoid copying strings longer than the buffers (bsc#1051510).
- cifs: Fix stack out-of-bounds in smb{2,3}_create_lease_buf() (bsc#1051510).
- cifs: Fix use after free of a mid_q_entry (bsc#1112903).
- cifs: check kmalloc before use (bsc#1051510).
- cifs: fix memory leak in SMB2_open() (bsc#1112894).
- cifs: integer overflow in in SMB2_ioctl() (bsc#1051510).
- cifs: store the leaseKey in the fid on SMB2_open (bsc#1051510).
- clk: clk-fixed-factor: Clear OF_POPULATED flag in case of failure (bsc#1051510).
- clk: core: Potentially free connection id (bsc#1051510).
- clk: imx6ul: fix missing of_node_put() (bsc#1051510).
- clk: meson: gxbb: remove HHI_GEN_CLK_CTNL duplicate definition (bsc#1051510).
- clk: mvebu: armada-38x: add support for 1866MHz variants (bsc#1105355).
- clk: mvebu: armada-38x: add support for missing clocks (bsc#1105355).
- clk: rockchip: Add pclk_rkpwm_pmu to PMU critical clocks in rk3399 (bsc#1051510).
- clk: rockchip: fix clk_i2sout parent selection bits on rk3399 (bsc#1051510).
- clk: tegra: bpmp: Do not crash when a clock fails to register (bsc#1051510).
- clk: x86: Stop marking clocks as CLK_IS_CRITICAL (bsc#1051510).
- clk: x86: add 'ether_clk' alias for Bay Trail / Cherry Trail (bsc#1051510).
- clocksource/drivers/ti-32k: Add CLOCK_SOURCE_SUSPEND_NONSTOP flag for non-am43 SoCs (bsc#1051510).
- clocksource/drivers/timer-atmel-pit: Properly handle error cases (bsc#1051510).
- cls_matchall: fix tcf_unbind_filter missing (networking-stable-18_08_21).
- coda: fix 'kernel memory exposure attempt' in fsync (bsc#1051510).
- coresight: Handle errors in finding input/output ports (bsc#1051510).
- coresight: tpiu: Fix disabling timeouts (bsc#1051510).
- cpu/hotplug: Fix SMT supported evaluation (bsc#1110006).
- cpufreq / CPPC: Set platform specific transition_delay_us (bsc#1101480).
- cpufreq, intel_pstate: Allow unspecified FADT profile to probe PPC (bsc#1108841).
- cpufreq: CPPC: Do not set transition_latency (bsc#1101480).
- cpufreq: CPPC: Use transition_delay_us depending transition_latency (bsc#1101480).
- cpufreq: remove setting of policy->cpu in policy->cpus during init (bsc#1101480).
- crypto: ablkcipher - fix crash flushing dcache in error path (bsc#1051510).
- crypto: blkcipher - fix crash flushing dcache in error path (bsc#1051510).
- crypto: caam - fix implicit casts in endianness helpers (bsc#1051510).
- crypto: caam/jr - fix ablkcipher_edesc pointer arithmetic (bsc#1051510).
- crypto: caam/jr - fix descriptor DMA unmapping (bsc#1051510).
- crypto: caam/qi - fix error path in xts setkey (bsc#1051510).
- crypto: cavium/nitrox - fix for command corruption in queue full case with backlog submissions (bsc#1051510).
- crypto: ccp - Check for NULL PSP pointer at module unload (bsc#1051510).
- crypto: ccp - Fix command completion detection race (bsc#1051510).
- crypto: ccp - add timeout support in the SEV command (bsc#1106838).
- crypto: chelsio - Fix memory corruption in DMA Mapped buffers (bsc#1051510).
- crypto: clarify licensing of OpenSSL asm code ().
- crypto: lrw - Fix out-of bounds access on counter overflow (bsc#1051510).
- crypto: mxs-dcp - Fix wait logic on chan threads (bsc#1051510).
- crypto: qat - Fix KASAN stack-out-of-bounds bug in adf_probe() (bsc#1051510).
- crypto: sharah - Unregister correct algorithms for SAHARA 3 (bsc#1051510).
- crypto: skcipher - Fix -Wstringop-truncation warnings (bsc#1051510).
- crypto: skcipher - fix aligning block size in skcipher_copy_iv() (bsc#1051510).
- crypto: skcipher - fix crash flushing dcache in error path (bsc#1051510).
- crypto: tcrypt - fix ghash-generic speed test (bsc#1051510).
- crypto: vmac - require a block cipher with 128-bit block size (bsc#1051510).
- crypto: vmac - separate tfm and request context (bsc#1051510).
- crypto: vmx - Fix sleep-in-atomic bugs (bsc#1051510).
- crypto: vmx - Use skcipher for ctr fallback to SLE12-SP4 (bsc#1106464).
- crypto: x86/sha256-mb - fix digest copy in sha256_mb_mgr_get_comp_job_avx2() (bsc#1051510).
- cxgb4: Fix the condition to check if the card is T5 (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: fix abort_req_rss6 struct (bsc#1046540).
- cxgb4: when disabling dcb set txq dcb priority to 0 (bsc#1046540 ).
- cxl: Configure PSL to not use APC virtual machines (bsc#1055014, git-fixes).
- cxl: Fix wrong comparison in cxl_adapter_context_get() (bsc#1055014, git-fixes).
- dax: Fix deadlock in dax_lock_mapping_entry() (bsc#1109951).
- dax: Introduce a ->copy_to_iter dax operation (bsc#1098782).
- dax: Make extension of dax_operations transparent (bsc#1098782).
- dax: Report bytes remaining in dax_iomap_actor() (bsc#1098782).
- dax: remove VM_MIXEDMAP for fsdax and device dax (bsc#1106007).
- dax: remove default copy_from_iter fallback (bsc#1098782).
- dax: require 'struct page' by default for filesystem dax (bsc#1104888).
- dax: store pfns in the radix (bsc#1104888).
- dccp: fix undefined behavior with 'cwnd' shift in ccid2_cwnd_restart() (netfilter-stable-18_08_17).
- debugobjects: Make stack check warning more informative (bsc#1051510).
- declance: Fix continuation with the adapter identification message (bsc#1051510).
- device-dax: Add missing address_space_operations (bsc#1107783).
- device-dax: Enable page_mapping() (bsc#1107783).
- device-dax: Set page->index (bsc#1107783).
- devicectree: bindings: fix location of leds common file (bsc#1051510).
- dma-buf: remove redundant initialization of sg_table (bsc#1051510).
- dmaengine: hsu: Support dmaengine_terminate_sync() (bsc#1051510).
- dmaengine: idma64: Support dmaengine_terminate_sync() (bsc#1051510).
- dmaengine: mv_xor_v2: kill the tasklets upon exit (bsc#1051510).
- dmaengine: pl330: fix irq race with terminate_all (bsc#1051510).
- do d_instantiate/unlock_new_inode combinations safely (git-fixes).
- doc/README.SUSE: Remove mentions of cloneconfig (bsc#1103636).
- driver core: add __printf verification to __ata_ehi_pushv_desc (bsc#1051510).
- drivers/base: stop new probing during shutdown (bsc#1051510).
- drivers/tty: add error handling for pcmcia_loop_config (bsc#1051510).
- drm/amd/pp/Polaris12: Fix a chunk of registers missed to program (bsc#1051510).
- drm/amdgpu/powerplay: fix missing break in switch statements (bsc#1113722)
- drm/amdgpu: Enable/disable gfx PG feature in rlc safe mode (bsc#1051510).
- drm/amdgpu: Fix RLC safe mode test in gfx_v9_0_enter_rlc_safe_mode (bsc#1051510).
- drm/amdgpu: Fix SDMA HQD destroy error on gfx_v7 (bsc#1051510).
- drm/amdgpu: Fix vce work queue was not cancelled when suspend (bsc#1106110)
- drm/amdgpu: Pulling old prepare and submit for flip back (bsc#1051510).
- drm/amdgpu: Update power state at the end of smu hw_init (bsc#1051510).
- drm/amdgpu: add another ATPX quirk for TOPAZ (bsc#1051510).
- drm/amdgpu: add new polaris pci id (bsc#1051510).
- drm/amdgpu: fix error handling in amdgpu_cs_user_fence_chunk (bsc#1106110)
- drm/amdgpu: fix swapped emit_ib_size in vce3 (bsc#1051510).
- drm/amdgpu: revert 'fix deadlock of reservation between cs and gpu reset v2' (bsc#1051510).
- drm/amdgpu: update tmr mc address (bsc#1100132).
- drm/amdgpu:add new firmware id for VCN (bsc#1051510).
- drm/amdgpu:add tmr mc address into amdgpu_firmware_info (bsc#1051510).
- drm/amdkfd: Fix error codes in kfd_get_process (bsc#1051510).
- drm/arm/malidp: Preserve LAYER_FORMAT contents when setting format (bsc#1051510).
- drm/armada: fix colorkey mode property (bsc#1051510).
- drm/armada: fix irq handling (bsc#1051510).
- drm/bridge/sii8620: Fix display of packed pixel modes (bsc#1051510).
- drm/bridge/sii8620: fix display of packed pixel modes in MHL2 (bsc#1051510).
- drm/bridge/sii8620: fix loops in EDID fetch logic (bsc#1051510).
- drm/bridge: adv7511: Reset registers on hotplug (bsc#1051510).
- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo B50-80 (bsc#1051510).
- drm/edid: VSDB yCBCr420 Deep Color mode bit definitions (bsc#1051510).
- drm/exynos: decon5433: Fix WINCONx reset value (bsc#1051510).
- drm/exynos: decon5433: Fix per-plane global alpha for XRGB modes (bsc#1051510).
- drm/exynos: gsc: Fix support for NV16/61, YUV420/YVU420 and YUV422 modes (bsc#1051510).
- drm/fb-helper: Fix typo on kerneldoc (bsc#1051510).
- drm/hisilicon: hibmc: Do not carry error code in HiBMC framebuffer (bsc#1113722)
- drm/hisilicon: hibmc: Do not overwrite fb helper surface depth (bsc#1113722)
- drm/i915/aml: Introducing Amber Lake platform ().
- drm/i915/audio: Fix audio enumeration issue on BXT ().
- drm/i915/audio: Hook up component bindings even if displays are (bsc#1113722)
- drm/i915/cfl: Add a new CFL PCI ID ().
- drm/i915/dp: Link train Fallback on eDP only if fallback link BW can fit panel's native mode (bsc#1051510).
- drm/i915/gen9+: Fix initial readout for Y tiled framebuffers (bsc#1113722)
- drm/i915/glk: Add Quirk for GLK NUC HDMI port issues (bsc#1051510).
- drm/i915/gvt: Fix the incorrect length of child_device_config issue (bsc#1051510).
- drm/i915/gvt: Off by one in intel_vgpu_write_fence() (bsc#1051510).
- drm/i915/gvt: clear ggtt entries when destroy vgpu (bsc#1051510).
- drm/i915/gvt: request srcu_read_lock before checking if one gfn is valid (bsc#1051510).
- drm/i915/kvmgt: Fix potential Spectre v1 (bsc#1051510).
- drm/i915/lpe: Mark LPE audio runtime pm as 'no callbacks' (bsc#1051510).
- drm/i915/overlay: Allocate physical registers from stolen (bsc#1051510).
- drm/i915/whl: Introducing Whiskey Lake platform ().
- drm/i915: Handle incomplete Z_FINISH for compressed error states (bsc#1100132)
- drm/i915: Increase LSPCON timeout (bsc#1051510).
- drm/i915: Nuke the LVDS lid notifier (bsc#1051510).
- drm/i915: Only show debug for state changes when banning (bsc#1051510).
- drm/i915: Restore user forcewake domains across suspend (bsc#1100132).
- drm/i915: Restore vblank interrupts earlier (bsc#1051510).
- drm/i915: Unmask user interrupts writes into HWSP on snb/ivb/vlv/hsw (bsc#1051510).
- drm/i915: set DP Main Stream Attribute for color range on DDI platforms (bsc#1051510).
- drm/imx: imx-ldb: check if channel is enabled before printing warning (bsc#1051510).
- drm/imx: imx-ldb: disable LDB on driver bind (bsc#1051510).
- drm/mediatek: fix OF sibling-node lookup (bsc#1106110)
- drm/modes: Introduce drm_mode_match() ().
- drm/msm: fix OF child-node lookup (bsc#1106110)
- drm/nouveau/TBDdevinit: do not fail when PMU/PRE_OS is missing from VBIOS (bsc#1051510).
- drm/nouveau/debugfs: Wake up GPU before doing any reclocking (bsc#1051510).
- drm/nouveau/disp: fix DP disable race (bsc#1051510).
- drm/nouveau/drm/nouveau: Do not forget to cancel hpd_work on suspend/unload (bsc#1051510).
- drm/nouveau/drm/nouveau: Fix bogus drm_kms_helper_poll_enable() placement (bsc#1051510).
- drm/nouveau/drm/nouveau: Prevent handling ACPI HPD events too early (bsc#1051510).
- drm/nouveau/drm/nouveau: Use pm_runtime_get_noresume() in connector_detect() (bsc#1051510).
- drm/nouveau: Do not disable polling in fallback mode (bsc#1103356).
- drm/nouveau: Fix deadlocks in nouveau_connector_detect() (bsc#1051510).
- drm/nouveau: Fix runtime PM leak in drm_open() (bsc#1051510).
- drm/nouveau: tegra: Detach from ARM DMA/IOMMU mapping (bsc#1051510).
- drm/panel: type promotion bug in s6e8aa0_read_mtp_id() (bsc#1051510).
- drm/rockchip: lvds: add missing of_node_put (bsc#1051510).
- drm/sti: do not remove the drm_bridge that was never added (bsc#1100132)
- drm/sun4i: Fix an ulong overflow in the dotclock driver (bsc#1106110)
- drm/sun4i: Fix releasing node when enumerating enpoints (bsc#1051510).
- drm/tegra: Check for malformed offsets and sizes in the 'submit' IOCTL (bsc#1106170).
- drm/tegra: Fix comparison operator for buffer size (bsc#1100132).
- drm/vc4: Fix the 'no scaling' case on multi-planar YUV formats (bsc#1051510).
- drm/virtio: fix bounds check in virtio_gpu_cmd_get_capset() (bsc#1113722)
- drm: Add DRM client cap for aspect-ratio ().
- drm: Add and handle new aspect ratios in DRM layer ().
- drm: Add aspect ratio parsing in DRM layer ().
- drm: Expose modes with aspect ratio, only if requested ().
- drm: Handle aspect ratio info in legacy modeset path ().
- drm: mali-dp: Call drm_crtc_vblank_reset on device init (bsc#1051510).
- drm: mali-dp: Enable Global SE interrupts mask for DP500 (bsc#1051510).
- drm: udl: Destroy framebuffer only if it was initialized (bsc#1051510).
- dwc2: gadget: Fix ISOC IN DDMA PID bitfield value calculation (bsc#1051510).
- e1000: check on netif_running() before calling e1000_up() (bsc#1051510).
- e1000: ensure to free old tx/rx rings in set_ringparam() (bsc#1051510).
- eeprom: at24: change nvmem stride to 1 (bsc#1051510).
- eeprom: at24: check at24_read/write arguments (bsc#1051510).
- eeprom: at24: correctly set the size for at24mac402 (bsc#1051510).
- efi: Avoid potential crashes, fix the 'struct efi_pci_io_protocol_32' definition for mixed mode (bsc#1110006).
- enable CONFIG_SCSI_MQ_DEFAULT (bsc#1107207)
- enable MLX5 in azure (bsc#1108260)
- enic: do not call enic_change_mtu in enic_probe (bsc#1051510).
- enic: handle mtu change for vf properly (bsc#1051510).
- enic: initialize enic->rfs_h.lock in enic_probe (bsc#1051510).
- errseq: Add to documentation tree (bsc#1107008).
- errseq: Always report a writeback error once (bsc#1107008).
- ethtool: Remove trailing semicolon for static inline (bsc#1051510).
- ethtool: fix a privilege escalation bug (bsc#1076830).
- evm: Do not deadlock if a crypto algorithm is unavailable (bsc#1051510).
- ext2, dax: introduce ext2_dax_aops (bsc#1104888).
- ext2, dax: set ext2_dax_aops for dax files (bsc#1112554).
- ext2: auto disable dax instead of failing mount (bsc#1104888).
- ext4, dax: add ext4_bmap to ext4_dax_aops (bsc#1104888).
- ext4, dax: introduce ext4_dax_aops (bsc#1104888).
- ext4, dax: set ext4_dax_aops for dax files (bsc#1104888).
- ext4: auto disable dax instead of failing mount (bsc#1104888).
- ext4: avoid arithemetic overflow that can trigger a BUG (bsc#1112736).
- ext4: avoid divide by zero fault when deleting corrupted inline directories (bsc#1112735).
- ext4: check for NUL characters in extended attribute's name (bsc#1112732).
- ext4: check to make sure the rename(2)'s destination is not freed (bsc#1112734).
- ext4: do not mark mmp buffer head dirty (bsc#1112743).
- ext4: fix online resize's handling of a too-small final block group (bsc#1112739).
- ext4: fix online resizing for bigalloc file systems with a 1k block size (bsc#1112740).
- ext4: fix spectre gadget in ext4_mb_regular_allocator() (bsc#1112733).
- ext4: recalucate superblock checksum after updating free blocks/inodes (bsc#1112738).
- ext4: reset error code in ext4_find_entry in fallback (bsc#1112731).
- ext4: show test_dummy_encryption mount option in /proc/mounts (bsc#1112741).
- ext4: sysfs: print ext4_super_block fields as little-endian (bsc#1106229).
- extcon: Release locking when sending the notification of connector state (bsc#1051510).
- f2fs: remove unneeded memory footprint accounting (bsc#1106233).
- f2fs: remove unneeded memory footprint accounting (bsc#1106297).
- f2fs: validate before set/clear free nat bitmap (bsc#1106231).
- f2fs: validate before set/clear free nat bitmap (bsc#1106297).
- fat: fix memory allocation failure handling of match_strdup() (bsc#1051510).
- fb: fix lost console when the user unplugs a USB adapter (bsc#1051510).
- fbdev/omapfb: fix omapfb_memory_read infoleak (bsc#1051510).
- fbdev/via: fix defined but not used warning (bsc#1051510).
- fbdev: Distinguish between interlaced and progressive modes (bsc#1051510).
- fbdev: omapfb: off by one in omapfb_register_client() (bsc#1051510).
- filesystem-dax: Introduce dax_lock_mapping_entry() (bsc#1107783).
- filesystem-dax: Set page->index (bsc#1107783).
- firmware, DMI: Add function to look up a handle and return DIMM size (bsc#1099125).
- firmware: raspberrypi: Register hwmon driver (bsc#1108468).
- fix __legitimize_mnt()/mntput() race (bsc#1106297).
- fix a page leak in vhost_scsi_iov_to_sgl() error recovery (bsc#1051510).
- fix mntput/mntput race (bsc#1106297).
- floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl (bsc#1051510).
- fs, dax: prepare for dax-specific address_space_operations (bsc#1104888).
- fs, dax: use page->mapping to warn if truncate collides with a busy page (bsc#1104888).
- fs/9p/xattr.c: catch the error of p9_client_clunk when setting xattr failed (bsc#1051510).
- fs/dcache.c: fix kmemcheck splat at take_dentry_name_snapshot() (git-fixes).
- fs/proc/proc_sysctl.c: fix potential page fault while unregistering sysctl table (bsc#1106297).
- fs/quota: Fix spectre gadget in do_quotactl (bsc#1112745).
- fs: dcache: Avoid livelock between d_alloc_parallel and __d_add (git-fixes).
- fs: dcache: Use READ_ONCE when accessing i_dir_seq (git-fixes).
- fuse: Add missed unlock_page() to fuse_readpages_fill() (bsc#1106291).
- fuse: Do not access pipe->buffers without pipe_lock() (bsc#1051510).
- fuse: Fix oops at process_init_reply() (bsc#1106291).
- fuse: fix double request_end() (bsc#1106291).
- fuse: fix initial parallel dirops (bsc#1106291).
- fuse: fix unlocked access to processing queue (bsc#1106291).
- fuse: umount should wait for all requests (bsc#1106291).
- gen_stats: Fix netlink stats dumping in the presence of padding (netfilter-stable-18_07_23).
- genirq: Add handle_fasteoi_{level,edge}_irq flow handlers (bsc#1105378).
- genirq: Export more irq_chip_*_parent() functions (bsc#1105378).
- getname_kernel() needs to make sure that ->name != ->iname in long case (git-fixes).
- getxattr: use correct xattr length (bsc#1106235).
- getxattr: use correct xattr length (bsc#1106297).
- gpio: Add gpio driver support for ThunderX and OCTEON-TX (bsc#1105378).
- gpio: Fix crash due to registration race (bsc#1051510).
- gpio: Fix wrong rounding in gpio-menz127 (bsc#1051510).
- gpio: adp5588: Fix sleep-in-atomic-context bug (bsc#1051510).
- gpio: mb86s70: Revert 'Return error if requesting an already assigned gpio' (bsc#1051510).
- gpio: ml-ioh: Fix buffer underwrite on probe error path (bsc#1051510).
- gpio: pxa: Fix potential NULL dereference (bsc#1051510).
- gpio: tegra: Move driver registration to subsys_init level (bsc#1051510).
- gpio: thunderx: fix error return code in thunderx_gpio_probe() (bsc#1105378).
- gpio: thunderx: remove unused .map() hook from irq_domain_ops (bsc#1105378).
- gpiolib-acpi: Register GpioInt ACPI event handlers from a late_initcall (bsc#1051510).
- gpiolib-acpi: make sure we trigger edge events at least once on boot (bsc#1051510).
- gpiolib: Free the last requested descriptor (bsc#1051510).
- gpiolib: Mark gpio_suffixes array with __maybe_unused (bsc#1051510).
- gpiolib: acpi: Switch to cansleep version of GPIO library call (bsc#1051510).
- gpu: host1x: Check whether size of unpin isn't 0 (bsc#1051510).
- gpu: ipu-v3: csi: pass back mbus_code_to_bus_cfg error codes (bsc#1051510).
- gpu: ipu-v3: default to id 0 on missing OF alias (bsc#1051510).
- hfs: prevent crash on exit from failed search (bsc#1051510).
- hfsplus: do not return 0 when fill_super() failed (bsc#1051510).
- hfsplus: stop workqueue when fill_super() failed (bsc#1051510).
- hotplug/cpu: Add operation queuing function ().
- hotplug/cpu: Conditionally acquire/release DRC index ().
- hotplug/cpu: Provide CPU readd operation ().
- hv: Synthetic typo correction (bsc#1107207).
- hv: add SPDX license id to Kconfig (bsc#1107207).
- hv: add SPDX license to trace (bsc#1107207).
- hv: avoid crash in vmbus sysfs files (bsc#1108377).
- hv_balloon: trace post_status (bsc#1107207).
- hv_netvsc: Add NetVSP v6 and v6.1 into version negotiation (bsc#1107207).
- hv_netvsc: Add handlers for ethtool get/set msg level (bsc#1107207).
- hv_netvsc: Add per-cpu ethtool stats for netvsc (bsc#1107207).
- hv_netvsc: Add range checking for rx packet offset and length (bsc#1107207).
- hv_netvsc: Clean up extra parameter from rndis_filter_receive_data() (bsc#1107207).
- hv_netvsc: Fix a deadlock by getting rtnl lock earlier in netvsc_probe() (bsc#1107207).
- hv_netvsc: Fix the return status in RX path (bsc#1107207).
- hv_netvsc: Fix the variable sizes in ipsecv2 and rsc offload (bsc#1107207).
- hv_netvsc: Pass net_device parameter to revoke and teardown functions (bsc#1107207).
- hv_netvsc: add trace points (bsc#1107207).
- hv_netvsc: fix bogus ifalias on network device (bsc#1107207).
- hv_netvsc: fix network namespace issues with VF support (bsc#1107207).
- hv_netvsc: fix schedule in RCU context ().
- hv_netvsc: fix schedule in RCU context (bsc#1107207).
- hv_netvsc: fix vf serial matching with pci slot info (bsc#1107207).
- hv_netvsc: ignore devices that are not PCI (bsc#1107207).
- hv_netvsc: move VF to same namespace as netvsc device (bsc#1107207).
- hv_netvsc: pair VF based on serial number (bsc#1107207).
- hv_netvsc: pass netvsc_device to rndis halt (bsc#1107207).
- hv_netvsc: propogate Hyper-V friendly name into interface alias (bsc#1107207).
- hv_netvsc: select needed ucs2_string routine (bsc#1107207).
- hv_netvsc: simplify receive side calling arguments (bsc#1107207).
- hv_netvsc: typo in NDIS RSS parameters structure (bsc#1107207).
- hv_vmbus: Correct the stale comments regarding cpu affinity (bsc#1107207).
- hwmon: (adt7475) Make adt7475_read_word() return errors (bsc#1051510).
- hwmon: (ina2xx) fix sysfs shunt resistor read access (bsc#1051510).
- hwmon: (nct6775) Set weight source to zero correctly (bsc#1051510).
- hwmon: Add support for RPi voltage sensor (bsc#1108468).
- hwmon: rpi: add module alias to raspberrypi-hwmon (bsc#1108468).
- hwrng: core - document the quality field (bsc#1051510).
- hyper-v: use GFP_KERNEL for hv_context.hv_numa_map (bsc#1107207).
- hypfs_kill_super(): deal with failed allocations (bsc#1051510).
- i2c: core: ACPI: Properly set status byte to 0 for multi-byte writes (bsc#1051510).
- i2c: davinci: Avoid zero value of CLKH (bsc#1051510).
- i2c: i2c-scmi: fix for i2c_smbus_write_block_data (bsc#1051510).
- i2c: i801: Add missing documentation entries for Braswell and Kaby Lake (bsc#1051510).
- i2c: i801: Add support for Intel Cedar Fork (bsc#1051510).
- i2c: i801: Add support for Intel Ice Lake (bsc#1051510).
- i2c: i801: Allow ACPI AML access I/O ports not reserved for SMBus (bsc#1051510).
- i2c: i801: Consolidate chipset names in documentation and Kconfig (bsc#1051510).
- i2c: i801: fix DNV's SMBCTRL register offset (bsc#1051510).
- i2c: imx: Fix race condition in dma read (bsc#1051510).
- i2c: rcar: cleanup DMA for all kinds of failure (bsc#1051510).
- i2c: uniphier-f: issue STOP only for last message or I2C_M_STOP (bsc#1051510).
- i2c: uniphier: issue STOP only for last message or I2C_M_STOP (bsc#1051510).
- i2c: xiic: Make the start and the byte count write atomic (bsc#1051510).
- i2c: xlp9xx: Fix case where SSIF read transaction completes early (bsc#1105907).
- i2c: xlp9xx: Fix issue seen when updating receive length (bsc#1105907).
- i2c: xlp9xx: Make sure the transfer size is not more than I2C_SMBUS_BLOCK_SIZE (bsc#1105907).
- i40e: fix condition of WARN_ONCE for stat strings (bsc#1107522).
- ib_srpt: Fix a use-after-free in srpt_close_ch() (bsc#1046306 ).
- ibmvnic: Include missing return code checks in reset function (bsc#1107966).
- ieee802154: ca8210: fix uninitialised data read (bsc#1051510).
- ieee802154: fix gcc-4.9 warnings (bsc#1051510).
- ieee802154: mrf24j40: fix incorrect mask in mrf24j40_stop (bsc#1051510).
- iio: 104-quad-8: Fix off-by-one error in register selection (bsc#1051510).
- iio: ad9523: Fix displayed phase (bsc#1051510).
- iio: ad9523: Fix return value for ad952x_store() (bsc#1051510).
- iio: adc: at91: fix acking DRDY irq on simple conversions (bsc#1051510).
- iio: adc: at91: fix wrong channel number in triggered buffer mode (bsc#1051510).
- iio: adc: imx25-gcq: Fix leak of device_node in mx25_gcq_setup_cfgs() (bsc#1051510).
- iio: adc: ina2xx: avoid kthread_stop() with stale task_struct (bsc#1051510).
- iio: adc: sun4i-gpadc: select REGMAP_IRQ (bsc#1051510).
- iio: sca3000: Fix an error handling path in 'sca3000_probe()' (bsc#1051510).
- iio: sca3000: Fix missing return in switch (bsc#1051510).
- ima: based on policy verify firmware signatures (pre-allocated buffer) (bsc#1051510).
- include/rdma/opa_addr.h: Fix an endianness issue (bsc#1046306 ).
- input: rohm_bu21023: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT) (bsc#1051510).
- intel_th: Fix device removal logic (bsc#1051510).
- intel_th: pci: Add Ice Lake PCH support (bsc#1051510).
- iommu/amd: Add support for IOMMU XT mode ().
- iommu/amd: Add support for higher 64-bit IOMMU Control Register ().
- iommu/amd: Clear memory encryption mask from physical address (bsc#1106105).
- iommu/amd: Finish TLB flush in amd_iommu_unmap() (bsc#1106105).
- iommu/amd: Return devid as alias for ACPI HID devices (bsc#1106105).
- iommu/amd: make sure TLB to be flushed before IOVA freed (bsc#1106105).
- iommu/arm-smmu-v3: Do not free page table ops twice (bsc#1106237).
- iommu/arm-smmu: Error out only if not enough context interrupts (bsc#1106237).
- iommu/vt-d: Add definitions for PFSID (bsc#1106237).
- iommu/vt-d: Fix a potential memory leak (bsc#1106105).
- iommu/vt-d: Fix dev iotlb pfsid use (bsc#1106237).
- iommu/vt-d: Fix scatterlist offset handling (bsc#1106237).
- iommu/vt-d: Ratelimit each dmar fault printing (bsc#1106105).
- ioremap: Update pgtable free interfaces with addr (bsc#1110006).
- ip: hash fragments consistently (netfilter-stable-18_07_27).
- ip: in cmsg IP(V6)_ORIGDSTADDR call pskb_may_pull (netfilter-stable-18_07_27).
- ipc/shm: fix shmat() nil address after round-down when remapping (bsc#1090078).
- ipmi/powernv: Fix error return code in ipmi_powernv_probe() (git-fixes).
- ipmi: Fix some counter issues (bsc#1105907).
- ipmi: Move BT capabilities detection to the detect call (bsc#1106779).
- ipmi: Remove ACPI SPMI probing from the SSIF (I2C) driver (bsc#1105907).
- ipmi:bt: Set the timeout before doing a capabilities check (bsc#1051510).
- ipmi:ssif: Add support for multi-part transmit messages > 2 parts (bsc#1103308).
- ipv4: Return EINVAL when ping_group_range sysctl does not map to user ns (netfilter-stable-18_07_23).
- ipv4: fix use-after-free in ip_cmsg_recv_dstaddr() (git-fixes).
- ipv4: remove BUG_ON() from fib_compute_spec_dst (netfilter-stable-18_08_01).
- ipv6: fix useless rol32 call on hash (netfilter-stable-18_07_23).
- ipv6: ila: select CONFIG_DST_CACHE (netfilter-stable-18_07_23).
- ipv6: make DAD fail with enhanced DAD when nonce length differs (netfilter-stable-18_07_23).
- ipv6: sr: fix passing wrong flags to crypto_alloc_shash() (networking-stable-18_07_19).
- ipvlan: fix IFLA_MTU ignored on NEWLINK (networking-stable-18_07_19).
- irq/core: Fix boot crash when the irqaffinity= boot parameter is passed on CPUMASK_OFFSTACK=y kernels(v1) (bsc#1051510).
- irqchip/bcm7038-l1: Hide cpu offline callback when building for !SMP (bsc#1051510).
- irqdomain: Add irq_domain_{push,pop}_irq() functions (bsc#1105378).
- irqdomain: Check for NULL function pointer in irq_domain_free_irqs_hierarchy() (bsc#1105378).
- irqdomain: Factor out code to add and remove items to and from the revmap (bsc#1105378).
- irqdomain: Prevent potential NULL pointer dereference in irq_domain_push_irq() (bsc#1105378).
- irqdomain: Update the comments of fwnode field of irq_domain structure (bsc#1051510).
- isdn: Disable IIOCDBGVAR (bsc#1051510).
- iw_cxgb4: remove duplicate memcpy() in c4iw_create_listen() (bsc#1046543).
- iwlwifi: dbg: do not crash if the firmware crashes in the middle of a debug dump (bsc#1051510).
- iwlwifi: mvm: Allow TKIP for AP mode (bsc#1051510).
- iwlwifi: mvm: check for n_profiles validity in EWRD ACPI (bsc#1051510).
- iwlwifi: mvm: clear HW_RESTART_REQUESTED when stopping the interface (bsc#1051510).
- iwlwifi: mvm: open BA session only when sta is authorized (bsc#1051510).
- iwlwifi: mvm: send BCAST management frames to the right station (bsc#1051510).
- iwlwifi: pcie gen2: check iwl_pcie_gen2_set_tb() return value (bsc#1051510).
- iwlwifi: pcie: do not access periphery registers when not available (bsc#1051510).
- iwlwifi: pcie: gen2: build A-MSDU only for GSO (bsc#1051510).
- ixgbe: Refactor queue disable logic to take completion time into account (bsc#1101557).
- ixgbe: Reorder Tx/Rx shutdown to reduce time needed to stop device (bsc#1101557).
- jbd2: fix use after free in jbd2_log_do_checkpoint() (bsc#1113257).
- kABI: Hide get_msr_feature() in kvm_x86_ops (bsc#1106240).
- kABI: protect eswitch.h include (kabi).
- kABI: protect struct nf_conn (kabi).
- kABI: protect struct vsock_sock (kabi).
- kABI: reexport tcp_send_ack (kabi).
- kABI: reexport vsock_pending_work (kabi).
- kabi fix for check_disk_size_change() (bsc#1098459).
- kabi protect enum mem_type (bsc#1099125).
- kabi protect hnae_ae_ops (bsc#1107924).
- kabi protect struct kvm_sync_regs (bsc#1106948).
- kabi/severities: Whitelist libceph, rbd, and ceph (bsc#1096748).
- kabi/severities: add qeth inter-module symbols to ignore list.
- kabi/severities: ignore __xive_vm_h_* KVM internal symbols.
- kabi/severities: ignore ppc64 realmode helpers. KVM fixes remove exports of realmode_pfn_to_page iommu_tce_xchg_rm mm_iommu_lookup_rm mm_iommu_ua_to_hpa_rm. Some are no longer used and others are no longer exported because the code was consolideted in one place. These helpers are to be called in realmode and linking to them from non-KVM modules is a bug. Hence removing them does not break KABI.
- kabi: move s390 mm_context_t lock to mm_struct and ignore the change (bsc#1103421).
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bsc#1105536).
- kernfs: update comment about kernfs_path() return value (bsc#1051510).
- kprobes/x86: Disable preemption in ftrace-based jprobes (bsc#1110006).
- kprobes/x86: Fix %p uses in error messages (bsc#1110006).
- kprobes/x86: Prohibit probing on exception masking instructions (bsc#1110006).
- kprobes/x86: Release insn_slot in failure path (bsc#1110006).
- ksm: fix unlocked iteration over vmas in cmp_and_merge_page() (VM Functionality bsc#1111806).
- kvm, mm: account shadow page tables to kmemcg (bsc#1110006).
- kvm/x86: kABI fix for vm_alloc/vm_free changes (bsc#1111506).
- kvm: Make VM ioctl do valloc for some archs (bsc#1111506).
- kvm: arm64: Convert kvm_set_s2pte_readonly() from inline asm to cmpxchg() (bsc#1108010).
- kvm: nVMX: Fix fault vector for VMX operation at CPL > 0 (bsc#1106105).
- kvm: nVMX: Use nested_run_pending rather than from_vmentry (bsc#1106240).
- kvm: x86: Set highest physical address bits in non-present/reserved SPTEs (bsc#1106240).
- kvm: x86: factor out kvm.arch.hyperv (de)init (bsc#1107207).
- kvm: x86: fix KVM_XEN_HVM_CONFIG ioctl (bsc#1110006).
- kvm: x86: hyperv: delete dead code in kvm_hv_hypercall() (bsc#1107207).
- kvm: x86: hyperv: guest->host event signaling via eventfd (bsc#1107207).
- kvm: x86: vmx: fix vpid leak (bsc#1106240).
- kvmclock: fix TSC calibration for nested guests (bsc#1110006).
- l2tp: use sk_dst_check() to avoid race on sk->sk_dst_cache (netfilter-stable-18_08_17).
- lan78xx: Check for supported Wake-on-LAN modes (bsc#1051510).
- lan78xx: Lan7801 Support for Fixed PHY (bsc#1085262).
- lan78xx: Set ASD in MAC_CR when EEE is enabled (bsc#1085262).
- lan78xx: remove redundant initialization of pointer 'phydev' (bsc#1085262).
- leds: max8997: use mode when calling max8997_led_set_mode (bsc#1051510).
- lib/bug.c: exclude non-BUG/WARN exceptions from report_bug() (bsc#1110006).
- lib/iov_iter: Fix pipe handling in _copy_to_iter_mcsafe() (bsc#1098782).
- lib/rhashtable: consider param->min_size when setting initial table size (bsc#1051510).
- lib/test_hexdump.c: fix failure on big endian cpu (bsc#1051510).
- lib/ubsan.c: s/missaligned/misaligned/ (bsc#1051510).
- lib/ubsan: add type mismatch handler for new GCC/Clang (bsc#1051510).
- lib/vsprintf: Remove atomic-unsafe support for %pCr (bsc#1051510).
- libahci: Fix possible Spectre-v1 pmp indexing in ahci_led_store() (bsc#1051510).
- libata: Fix command retry decision (bsc#1051510).
- libata: Fix compile warning with ATA_DEBUG enabled (bsc#1051510).
- libbpf: Makefile set specified permission mode (bsc#1083647).
- libceph: check authorizer reply/challenge length before reading (bsc#1096748).
- libceph: factor out __ceph_x_decrypt() (bsc#1096748).
- libceph: factor out __prepare_write_connect() (bsc#1096748).
- libceph: factor out encrypt_authorizer() (bsc#1096748).
- libceph: store ceph_auth_handshake pointer in ceph_connection (bsc#1096748).
- libceph: weaken sizeof check in ceph_x_verify_authorizer_reply() (bsc#1096748).
- libertas: call into generic suspend code before turning off power (bsc#1051510).
- libertas: fix suspend and resume for SDIO connected cards (bsc#1051510).
- libnvdimm, btt: fix uninitialized err_lock (bsc#1103961).
- libnvdimm, dimm: Maximize label transfer size (bsc#1111921, bsc#1113408, bsc#1113972).
- libnvdimm, label: Fix sparse warning (bsc#1111921, bsc#1113408, bsc#1113972).
- libnvdimm, label: change nvdimm_num_label_slots per UEFI 2.7 (bsc#1111921, bsc#1113408, bsc#1113972).
- libnvdimm, nfit: enable support for volatile ranges (bsc#1103961).
- libnvdimm, nfit: move the check on nd_reserved2 to the endpoint (bsc#1103961).
- libnvdimm, pmem: Fix memcpy_mcsafe() return code handling in nsio_rw_bytes() (bsc#1098782).
- libnvdimm, pmem: Restore page attributes when clearing errors (bsc#1107783).
- libnvdimm: Use max contiguous area for namespace size (git-fixes).
- libnvdimm: fix ars_status output length calculation (bsc#1104890).
- libnvdimm: rename nd_sector_size_{show,store} to nd_size_select_{show,store} (bsc#1103961).
- liquidio: fix hang when re-binding VF host drv after running DPDK VF driver (bsc#1067126).
- liquidio: fix kernel panic in VF driver (bsc#1067126).
- livepatch: Remove reliable stacktrace check in klp_try_switch_task() (bsc#1071995).
- livepatch: Validate module/old func name length (bsc#1071995).
- livepatch: create and include UAPI headers ().
- llc: use refcount_inc_not_zero() for llc_sap_find() (netfilter-stable-18_08_17).
- lockd: fix 'list_add double add' caused by legacy signal interface (git-fixes).
- loop: add recursion validation to LOOP_CHANGE_FD (bsc#1112711).
- loop: do not call into filesystem while holding lo_ctl_mutex (bsc#1112710).
- loop: fix LOOP_GET_STATUS lock imbalance (bsc#1113284).
- mac80211: Fix station bandwidth setting after channel switch (bsc#1051510).
- mac80211: Run TXQ teardown code before de-registering interfaces (bsc#1051510).
- mac80211: add stations tied to AP_VLANs during hw reconfig (bsc#1051510).
- mac80211: always account for A-MSDU header changes (bsc#1051510).
- mac80211: avoid kernel panic when building AMSDU from non-linear SKB (bsc#1051510).
- mac80211: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bsc#1051510).
- mac80211: do not Tx a deauth frame if the AP forbade Tx (bsc#1051510).
- mac80211: do not convert to A-MSDU if frag/subframe limited (bsc#1051510).
- mac80211: fix a race between restart and CSA flows (bsc#1051510).
- mac80211: fix an off-by-one issue in A-MSDU max_subframe computation (bsc#1051510).
- mac80211: fix pending queue hang due to TX_DROP (bsc#1051510).
- mac80211: fix setting IEEE80211_KEY_FLAG_RX_MGMT for AP mode keys (bsc#1051510).
- mac80211: mesh: fix HWMP sequence numbering to follow standard (bsc#1051510).
- mac80211: minstrel: fix using short preamble CCK rates on HT clients (bsc#1051510).
- mac80211: restrict delayed tailroom needed decrement (bsc#1051510).
- mac80211: shorten the IBSS debug messages (bsc#1051510).
- mac80211_hwsim: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bsc#1051510).
- mac80211_hwsim: require at least one channel (bsc#1051510).
- mach64: detect the dot clock divider correctly on sparc (bsc#1051510).
- macros.kernel-source: pass -b properly in kernel module package (bsc#1107870).
- mailbox: xgene-slimpro: Fix potential NULL pointer dereference (bsc#1051510).
- make sure that __dentry_kill() always invalidates d_seq, unhashed or not (git-fixes).
- md-cluster: clear another node's suspend_area after the copy is finished (bsc#1106333).
- md-cluster: do not send msg if array is closing (bsc#1106333).
- md-cluster: release RESYNC lock after the last resync message (bsc#1106688).
- md-cluster: show array's status more accurate (bsc#1106333).
- md/raid10: fix that replacement cannot complete recovery after reassemble (git-fixes).
- md/raid1: add error handling of read error from FailFast device (git-fixes).
- md/raid5-cache: disable reshape completely (git-fixes).
- md/raid5: fix data corruption of replacements after originals dropped (git-fixes).
- md: fix NULL dereference of mddev->pers in remove_and_add_spares() (git-fixes).
- media: Revert '[media] tvp5150: fix pad format frame height' (bsc#1051510).
- media: af9035: prevent buffer overflow on write (bsc#1051510).
- media: cx231xx: fix potential sign-extension overflow on large shift (bsc#1051510).
- media: davinci: vpif_display: Mix memory leak on probe error path (bsc#1051510).
- media: dvb: fix compat ioctl translation (bsc#1051510).
- media: em28xx: fix input name for Terratec AV 350 (bsc#1051510).
- media: em28xx: use a default format if TRY_FMT fails (bsc#1051510).
- media: exynos4-is: Prevent NULL pointer dereference in __isp_video_try_fmt() (bsc#1051510).
- media: fsl-viu: fix error handling in viu_of_probe() (bsc#1051510).
- media: helene: fix xtal frequency setting at power on (bsc#1051510).
- media: mem2mem: Remove excessive try_run call (bsc#1051510).
- media: omap3isp: zero-initialize the isp cam_xclk{a,b} initial data (bsc#1051510).
- media: pci: cx23885: handle adding to list failure (bsc#1051510).
- media: rtl28xxu: be sure that it won't go past the array size (bsc#1051510).
- media: s3c-camif: ignore -ENOIOCTLCMD from v4l2_subdev_call for s_power (bsc#1051510).
- media: s5p-mfc: Fix buffer look up in s5p_mfc_handle_frame_{new, copy_time} functions (bsc#1051510).
- media: soc_camera: ov772x: correct setting of banding filter (bsc#1051510).
- media: tm6000: add error handling for dvb_register_adapter (bsc#1051510).
- media: tvp5150: avoid going past array on v4l2_querymenu() (bsc#1051510).
- media: tvp5150: fix switch exit in set control handler (bsc#1051510).
- media: tvp5150: fix width alignment during set_selection() (bsc#1051510).
- media: tw686x: Fix oops on buffer alloc failure (bsc#1051510).
- media: uvcvideo: Fix uvc_alloc_entity() allocation alignment (bsc#1051510).
- media: v4l2-mem2mem: Fix missing v4l2_m2m_try_run call (bsc#1051510).
- media: v4l2-tpg: fix kernel oops when enabling HFLIP and OSD (bsc#1051510).
- media: videobuf-dma-sg: Fix dma_{sync,unmap}_sg() calls (bsc#1051510).
- media: videobuf2-core: check for q->error in vb2_core_qbuf() (bsc#1051510).
- media: vsp1: Fix YCbCr planar formats pitch calculation (bsc#1051510).
- mei: bus: type promotion bug in mei_nfc_if_version() (bsc#1051510).
- mei: do not update offset in write (bsc#1051510).
- mei: ignore not found client in the enumeration (bsc#1051510).
- mei: me: enable asynchronous probing ().
- memcg, thp: do not invoke oom killer on thp charges (bsc#1089663).
- memory: tegra: Apply interrupts mask per SoC (bsc#1051510).
- memory: tegra: Do not handle spurious interrupts (bsc#1051510).
- merge hyperv part of f5caf621
- mfd: 88pm860x-i2c: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT) (bsc#1051510).
- mfd: arizona: Correct calling of runtime_put_sync (bsc#1051510).
- mfd: arizona: Do not use regmap_read_poll_timeout (bsc#1051510).
- mfd: intel-lpss: Add Ice Lake PCI IDs (bsc#1051510).
- mfd: lpc_ich: Do not touch SPI-NOR write protection bit on Apollo Lake (bsc#1051510).
- mfd: sm501: Set coherent_dma_mask when creating subdevices (bsc#1051510).
- mfd: ti_am335x_tscadc: Fix struct clk memory leak (bsc#1051510).
- mlxsw: core_acl_flex_actions: Return error for conflicting actions (netfilter-stable-18_08_17).
- mm, dax: introduce pfn_t_special() (bsc#1104888).
- mm, madvise_inject_error: Disable MADV_SOFT_OFFLINE for ZONE_DEVICE pages (bsc#1107783).
- mm, madvise_inject_error: Let memory_failure() optionally take a page reference (bsc#1107783).
- mm, memory_failure: Collect mapping size in collect_procs() (bsc#1107783).
- mm, memory_failure: Teach memory_failure() about dev_pagemap pages (bsc#1107783).
- mm, numa: Migrate pages to local nodes quicker early in the lifetime of a task (bsc#1101669 optimise numa balancing for fast migrate).
- mm, numa: Remove rate-limiting of automatic numa balancing migration (bsc#1101669 optimise numa balancing for fast migrate).
- mm, numa: Remove rate-limiting of automatic numa balancing migration kabi (bsc#1101669 optimise numa balancing for fast migrate).
- mm, page_alloc: double zone's batchsize (bsc#971975 VM performance -- page allocator).
- mm/huge_memory.c: fix data loss when splitting a file pmd (bsc#1107074).
- mm/hugetlb: filter out hugetlb pages if HUGEPAGE migration is not supported (bsc#1106697).
- mm/migrate: Use spin_trylock() while resetting rate limit ().
- mm/vmalloc: add interfaces to free unmapped page table (bsc#1110006).
- mm/vmscan: wake up flushers for legacy cgroups too (bsc#1107061).
- mm: /proc/pid/pagemap: hide swap entries from unprivileged users (Git-fixes bsc#1109907).
- mm: Preserve _PAGE_DEVMAP across mprotect() calls (bsc#1111028).
- mm: fix BUG_ON() in vmf_insert_pfn_pud() from VM_MIXEDMAP removal (bsc#1111841).
- mm: fix devmem_is_allowed() for sub-page System RAM intersections (bsc#1106800).
- mm: memcg: fix use after free in mem_cgroup_iter() (bsc#1107065).
- mmc: block: avoid multiblock reads for the last sector in SPI mode (bsc#1051510).
- mmc: omap_hsmmc: fix wakeirq handling on removal (bsc#1051510).
- mmc: sdhci-of-esdhc: set proper dma mask for ls104x chips (bsc#1051510).
- mmc: sdhci: do not try to use 3.3V signaling if not supported (bsc#1051510).
- mmc: tegra: prevent HS200 on Tegra 3 (bsc#1051510).
- modpost: ignore livepatch unresolved relocations ().
- module: exclude SHN_UNDEF symbols from kallsyms api (bsc#1071995).
- move a hyperv related patch to correct place in series.conf
- move changes without Git-commit out of sorted section
- mwifiex: handle race during mwifiex_usb_disconnect (bsc#1051510).
- net/9p/client.c: version pointer uninitialized (bsc#1051510).
- net/9p/trans_fd.c: fix race by holding the lock (bsc#1051510).
- net/9p/trans_fd.c: fix race-condition by flushing workqueue before the kfree() (bsc#1051510).
- net/9p: Switch to wait_event_killable() (bsc#1051510).
- net/9p: fix error path of p9_virtio_probe (bsc#1051510).
- net/ipv4: Set oif in fib_compute_spec_dst (netfilter-stable-18_07_23).
- net/mlx5: E-Switch, Avoid setup attempt if not being e-switch manager (networking-stable-18_07_19).
- net/mlx5e: Avoid dealing with vport representors if not being e-switch manager (networking-stable-18_07_19).
- net/packet: fix use-after-free (networking-stable-18_07_19).
- net: add support for Cavium PTP coprocessor (bsc#1110096).
- net: bcmgenet: Fix sparse warnings in bcmgenet_put_tx_csum() (bsc#1051510).
- net: bcmgenet: Fix unmapping of fragments in bcmgenet_xmit() (bsc#1051510).
- net: bcmgenet: correct bad merge (bsc#1051510).
- net: bcmgenet: enable loopback during UniMAC sw_reset (bsc#1051510).
- net: bcmgenet: prevent duplicate calls of bcmgenet_dma_teardown (bsc#1051510).
- net: cavium: fix NULL pointer dereference in cavium_ptp_put (bsc#1110096).
- net: cavium: use module_pci_driver to simplify the code (bsc#1110096).
- net: dccp: avoid crash in ccid3_hc_rx_send_feedback() (networking-stable-18_07_19).
- net: dccp: switch rx_tstamp_last_feedback to monotonic clock (networking-stable-18_07_19).
- net: diag: Do not double-free TCP_NEW_SYN_RECV sockets in tcp_abort (netfilter-stable-18_07_23).
- net: dsa: Do not suspend/resume closed slave_dev (netfilter-stable-18_08_04).
- net: ena: Eliminate duplicate barriers on weakly-ordered archs (bsc#1108093).
- net: ena: Fix use of uninitialized DMA address bits field (netfilter-stable-18_08_01).
- net: ena: fix device destruction to gracefully free resources (bsc#1108093).
- net: ena: fix driver when PAGE_SIZE == 64kB (bsc#1108093).
- net: ena: fix incorrect usage of memory barriers (bsc#1108093).
- net: ena: fix missing calls to READ_ONCE (bsc#1108093).
- net: ena: fix missing lock during device destruction (bsc#1108093).
- net: ena: fix potential double ena_destroy_device() (bsc#1108093).
- net: ena: fix surprise unplug NULL dereference kernel crash (bsc#1108093).
- net: ethernet: mvneta: Fix napi structure mixup on armada 3700 (networking-stable-18_08_21).
- net: fix amd-xgbe flow-control issue (netfilter-stable-18_08_01).
- net: fix use-after-free in GRO with ESP (networking-stable-18_07_19).
- net: hns3: Fix MSIX allocation issue for VF (bsc#1104353 ).
- net: hns3: Fix comments for hclge_get_ring_chain_from_mbx (bsc#1104353).
- net: hns3: Fix desc num set to default when setting channel (bsc#1104353).
- net: hns3: Fix for command format parsing error in hclge_is_all_function_id_zero (bsc#1104353).
- net: hns3: Fix for information of phydev lost problem when down/up (bsc#1104353).
- net: hns3: Fix for l4 checksum offload bug (bsc#1104353 ).
- net: hns3: Fix for mac pause not disable in pfc mode (bsc#1104353).
- net: hns3: Fix for mailbox message truncated problem (bsc#1104353).
- net: hns3: Fix for phy link issue when using marvell phy driver (bsc#1104353).
- net: hns3: Fix for reset_level default assignment probelm (bsc#1104353).
- net: hns3: Fix for using wrong mask and shift in hclge_get_ring_chain_from_mbx (bsc#1104353).
- net: hns3: Fix for waterline not setting correctly (bsc#1104353).
- net: hns3: Fix get_vector ops in hclgevf_main module (bsc#1104353).
- net: hns3: Fix return value error in hns3_reset_notify_down_enet (bsc#1104353).
- net: hns3: Fix warning bug when doing lp selftest (bsc#1104353 ).
- net: hns3: Prevent sending command during global or core reset (bsc#1104353).
- net: hns3: Standardize the handle of return value (bsc#1104353 ).
- net: hns3: add unlikely for error check (bsc#1104353 ).
- net: hns3: fix page_offset overflow when CONFIG_ARM64_64K_PAGES (bsc#1104353).
- net: hns3: fix return value error while hclge_cmd_csq_clean failed (bsc#1104353).
- net: hns3: modify hnae_ to hnae3_ (bsc#1104353).
- net: hns3: remove some redundant assignments (bsc#1104353 ).
- net: hns3: remove unnecessary ring configuration operation while resetting (bsc#1104353).
- net: hns3: simplify hclge_cmd_csq_clean (bsc#1104353 ).
- net: hns: add netif_carrier_off before change speed and duplex (bsc#1107924).
- net: hns: add the code for cleaning pkt in chip (bsc#1107924).
- net: mdio-mux: bcm-iproc: fix wrong getter and setter pair (netfilter-stable-18_08_01).
- net: mvneta: fix mvneta_config_rss on armada 3700 (networking-stable-18_08_21).
- net: mvneta: fix the Rx desc DMA address in the Rx path (networking-stable-18_07_19).
- net: phy: consider PHY_IGNORE_INTERRUPT in phy_start_aneg_priv (netfilter-stable-18_07_27).
- net: phy: fix flag masking in __set_phy_supported (netfilter-stable-18_07_23).
- net: rtnl_configure_link: fix dev flags changes arg to __dev_notify_flags (git-fixes).
- net: skb_segment() should not return NULL (netfilter-stable-18_07_27).
- net: stmmac: Fix WoL for PCI-based setups (netfilter-stable-18_08_04).
- net: stmmac: mark PM functions as __maybe_unused (git-fixes).
- net: sungem: fix rx checksum support (networking-stable-18_07_19).
- net: systemport: Fix CRC forwarding check for SYSTEMPORT Lite (netfilter-stable-18_07_23).
- net: thunder: change q_len's type to handle max ring size (bsc#1110096).
- net: thunderx: Set max queue count taking XDP_TX into account (bsc#1110096).
- net: thunderx: add MAC address filter tracking for LMAC (bsc#1110096).
- net: thunderx: add XCAST messages handlers for PF (bsc#1110096).
- net: thunderx: add multicast filter management support (bsc#1110096).
- net: thunderx: add ndo_set_rx_mode callback implementation for VF (bsc#1110096).
- net: thunderx: add new messages for handle ndo_set_rx_mode callback (bsc#1110096).
- net: thunderx: add timestamping support (bsc#1110096).
- net: thunderx: add workqueue control structures for handle ndo_set_rx_mode request (bsc#1110096).
- net: thunderx: check for failed allocation lmac->dmacs (bsc#1110096).
- net: thunderx: fix double free error (bsc#1110096).
- net: thunderx: move filter register related macro into proper place (bsc#1110096).
- net: thunderx: prevent concurrent data re-writing by nicvf_set_rx_mode (bsc#1110096).
- net: thunderx: remove a couple of redundant assignments (bsc#1110096).
- net: thunderx: rework mac addresses list to u64 array (bsc#1110096).
- net_sched: Fix missing res info when create new tc_index filter (netfilter-stable-18_08_17).
- net_sched: blackhole: tell upper qdisc about dropped packets (networking-stable-18_07_19).
- netfilter: do not set F_IFACE on ipv6 fib lookups (netfilter-stable-18_06_25).
- netfilter: ip6t_rpfilter: provide input interface for route lookup (netfilter-stable-18_06_25).
- netfilter: ip6t_rpfilter: set F_IFACE for linklocal addresses (git-fixes).
- netfilter: nat: Revert 'netfilter: nat: convert nat bysrc hash to rhashtable' (netfilter-stable-17_11_16).
- netfilter: nf_tables: add missing netlink attrs to policies (netfilter-stable-18_06_27).
- netfilter: nf_tables: do not assume chain stats are set when jumplabel is set (netfilter-stable-18_06_27).
- netfilter: nf_tables: fix memory leak on error exit return (netfilter-stable-18_06_27).
- netfilter: nf_tables: nft_compat: fix refcount leak on xt module (netfilter-stable-18_06_27).
- netfilter: nf_tables: use WARN_ON_ONCE instead of BUG_ON in nft_do_chain() (netfilter-stable-18_06_25).
- netfilter: nft_compat: fix handling of large matchinfo size (netfilter-stable-18_06_27).
- netfilter: nft_compat: prepare for indirect info storage (netfilter-stable-18_06_27).
- netfilter: nft_meta: fix wrong value dereference in nft_meta_set_eval (netfilter-stable-18_06_27).
- netlink: Do not shift on 64 for ngroups (git-fixes).
- netlink: Do not shift with UB on nlk->ngroups (netfilter-stable-18_08_01).
- netlink: Do not subscribe to non-existent groups (netfilter-stable-18_08_01).
- netlink: Fix spectre v1 gadget in netlink_create() (netfilter-stable-18_08_04).
- nfs/filelayout: fix oops when freeing filelayout segment (bsc#1105190).
- nfs/pnfs: fix nfs_direct_req ref leak when i/o falls back to the mds (git-fixes).
- nfs41: do not return ENOMEM on LAYOUTUNAVAILABLE (git-fixes).
- nfsd: remove blocked locks on client teardown (git-fixes).
- nl80211: Add a missing break in parse_station_flags (bsc#1051510).
- nl80211: check nla_parse_nested() return values (bsc#1051510).
- nvdimm: Clarify comment in sizeof_namespace_index (bsc#1111921, bsc#1113408, bsc#1113972).
- nvdimm: Remove empty if statement (bsc#1111921, bsc#1113408, bsc#1113972).
- nvdimm: Sanity check labeloff (bsc#1111921, bsc#1113408, bsc#1113972).
- nvdimm: Split label init out from the logic for getting config data (bsc#1111921, bsc#1113408, bsc#1113972).
- nvdimm: Use namespace index data to reduce number of label reads needed (bsc#1111921, bsc#1113408, bsc#1113972).
- nvme: call nvme_complete_rq when nvmf_check_ready fails for mpath I/O (bsc#1107685).
- nvme: register ns_id attributes as default sysfs groups (bsc#1105247).
- nvme_fc: add 'nvme_discovery' sysfs attribute to fc transport device (bsc#1044189).
- objtool, kprobes/x86: Sync the latest asm/insn.h header with tools/objtool/arch/x86/include/asm/insn.h (bsc#1110006).
- of: add helper to lookup compatible child node (bsc#1106110)
- orangefs: fix deadlock; do not write i_size in read_iter (bsc#1051510).
- orangefs: initialize op on loop restart in orangefs_devreq_read (bsc#1051510).
- orangefs: use list_for_each_entry_safe in purge_waiting_ops (bsc#1051510).
- orangefs_kill_sb(): deal with allocation failures (bsc#1051510).
- ovl: Sync upper dirty data when syncing overlayfs (git-fixes).
- ovl: fix format of setxattr debug (git-fixes).
- parport: sunbpp: fix error return code (bsc#1051510).
- partitions/aix: append null character to print data from disk (bsc#1051510).
- partitions/aix: fix usage of uninitialized lv_info and lvname structures (bsc#1051510).
- perf/x86/amd/ibs: Do not access non-started event (bsc#1110006).
- perf/x86/cstate: Fix possible Spectre-v1 indexing for pkg_msr (bsc#1110006).
- perf/x86/intel/lbr: Fix incomplete LBR call stack (bsc#1110006).
- perf/x86/intel/uncore: Correct fixed counter index check for NHM (bsc#1110006).
- perf/x86/intel/uncore: Correct fixed counter index check in generic code (bsc#1110006).
- perf/x86/intel/uncore: Fix Skylake UPI event format (bsc#1110006).
- perf/x86/intel: Do not accidentally clear high bits in bdw_limit_period() (bsc#1110006).
- perf/x86/intel: Fix event update for auto-reload (bsc#1110006).
- perf/x86/intel: Fix large period handling on Broadwell CPUs (bsc#1110006).
- perf/x86/intel: Fix linear IP of PEBS real_ip on Haswell and later CPUs (bsc#1110006).
- perf/x86/intel: Properly save/restore the PMU state in the NMI handler (bsc#1110006).
- perf/x86/msr: Fix possible Spectre-v1 indexing in the MSR driver (bsc#1110006).
- perf/x86: Fix possible Spectre-v1 indexing for hw_perf_event cache_* (bsc#1110006).
- perf/x86: Fix possible Spectre-v1 indexing for x86_pmu::event_map() (bsc#1110006).
- pinctrl/amd: only handle irq if it is pending and unmasked (bsc#1051510).
- pinctrl: cannonlake: Fix HOSTSW_OWN register offset of H variant (bsc#1051510).
- pipe: actually allow root to exceed the pipe buffer limits (bsc#1106297).
- pipe: match pipe_max_size data type with procfs (git-fixes).
- platform/x86: alienware-wmi: Correct a memory leak (bsc#1051510).
- platform/x86: asus-nb-wmi: Add keymap entry for lid flip action on UX360 (bsc#1051510).
- platform/x86: thinkpad_acpi: Proper model/release matching (bsc#1051510).
- platform/x86: toshiba_acpi: Fix defined but not used build warnings (bsc#1051510).
- pmem: Switch to copy_to_iter_mcsafe() (bsc#1098782).
- pnfs/blocklayout: off by one in bl_map_stripe() (git-fixes).
- power: gemini-poweroff: Avoid more spurious poweroffs (bsc#1051510).
- power: generic-adc-battery: check for duplicate properties copied from iio channels (bsc#1051510).
- power: generic-adc-battery: fix out-of-bounds write when copying channel properties (bsc#1051510).
- power: remove possible deadlock when unregistering power_supply (bsc#1051510).
- power: supply: axp288_charger: Fix initial constant_charge_current value (bsc#1051510).
- power: supply: max77693_charger: fix unintentional fall-through (bsc#1051510).
- power: vexpress: fix corruption in notifier registration (bsc#1051510).
- powernv/pseries: consolidate code for mce early handling (bsc#1094244).
- powerpc/64s: Default l1d_size to 64K in RFI fallback flush (bsc#1068032, git-fixes).
- powerpc/64s: Fix DT CPU features Power9 DD2.1 logic (bsc#1055117).
- powerpc/64s: Fix compiler store ordering to SLB shadow area (bsc#1094244).
- powerpc/64s: move machine check SLB flushing to mm/slb.c (bsc#1094244).
- powerpc/fadump: cleanup crash memory ranges support (bsc#1103269).
- powerpc/fadump: re-register firmware-assisted dump if already registered (bsc#1108170, bsc#1108823).
- powerpc/firmware: Add definitions for new drc-info firmware feature (bsc#1109158).
- powerpc/kprobes: Fix call trace due to incorrect preempt count (bsc#1065729).
- powerpc/kvm/booke: Fix altivec related build break (bsc#1061840).
- powerpc/kvm: Switch kvm pmd allocator to custom allocator (bsc#1061840).
- powerpc/lib: Fix the feature fixup tests to actually work (bsc#1065729).
- powerpc/mce: Fix SLB rebolting during MCE recovery path (bsc#1094244).
- powerpc/mm/hugetlb: initialize the pagetable cache correctly for hugetlb (bsc#1091800).
- powerpc/mm: Rename find_linux_pte_or_hugepte() (bsc#1061840).
- powerpc/numa: Skip onlining a offline node in kdump path (bsc#1109784).
- powerpc/numa: Use associativity if VPHN hcall is successful (bsc#1110363).
- powerpc/perf: Fix IMC allocation routine (bsc#1054914).
- powerpc/perf: Fix memory allocation for core-imc based on num_possible_cpus() (bsc#1054914).
- powerpc/perf: Remove sched_task function defined for thread-imc (bsc#1054914).
- powerpc/pkeys: Fix reading of ibm, processor-storage-keys property (bsc#1109244).
- powerpc/powernv/ioda2: Reduce upper limit for DMA window size (bsc#1055120).
- powerpc/powernv/ioda: Allocate indirect TCE levels on demand (bsc#1061840).
- powerpc/powernv/ioda: Finish removing explicit max window size check (bsc#1061840).
- powerpc/powernv/ioda: Remove explicit max window size check (bsc#1061840).
- powerpc/powernv/npu: Do a PID GPU TLB flush when invalidating a large address range (bsc#1055120).
- powerpc/powernv: Add indirect levels to it_userspace (bsc#1061840).
- powerpc/powernv: Move TCE manupulation code to its own file (bsc#1061840).
- powerpc/powernv: Rework TCE level allocation (bsc#1061840).
- powerpc/pseries/mm: Introducing FW_FEATURE_BLOCK_REMOVE (bsc#1109158).
- powerpc/pseries/mm: call H_BLOCK_REMOVE (bsc#1109158).
- powerpc/pseries/mm: factorize PTE slot computation (bsc#1109158).
- powerpc/pseries: Avoid using the size greater than RTAS_ERROR_LOG_MAX (bsc#1094244).
- powerpc/pseries: Defer the logging of rtas error to irq work queue (bsc#1094244).
- powerpc/pseries: Define MCE error event section (bsc#1094244).
- powerpc/pseries: Disable CPU hotplug across migrations (bsc#1065729).
- powerpc/pseries: Display machine check error details (bsc#1094244).
- powerpc/pseries: Dump the SLB contents on SLB MCE errors (bsc#1094244).
- powerpc/pseries: Fix 'OF: ERROR: Bad of_node_put() on /cpus' during DLPAR (bsc#1113295).
- powerpc/pseries: Fix CONFIG_NUMA=n build (bsc#1067906, git-fixes).
- powerpc/pseries: Fix build break for SPLPAR=n and CPU hotplug (bsc#1079524, git-fixes).
- powerpc/pseries: Fix duplicate firmware feature for DRC_INFO (bsc#1109158).
- powerpc/pseries: Fix endianness while restoring of r3 in MCE handler (bsc#1094244).
- powerpc/pseries: Flush SLB contents on SLB MCE errors (bsc#1094244).
- powerpc/pseries: Remove prrn_work workqueue (bsc#1102495, bsc#1109337).
- powerpc/pseries: Remove unneeded uses of dlpar work queue (bsc#1102495, bsc#1109337).
- powerpc/pseries: fix EEH recovery of some IOV devices (bsc#1078720, git-fixes).
- powerpc/rtas: Fix a potential race between CPU-Offline Migration (bsc#1111870).
- powerpc/tm: Avoid possible userspace r1 corruption on reclaim (bsc#1109333).
- powerpc/tm: Fix userspace r13 corruption (bsc#1109333).
- powerpc/topology: Get topology for shared processors at boot (bsc#1104683).
- powerpc/xive: Fix trying to 'push' an already active pool VP (bsc#1085030, git-fixes).
- powerpc/xive: Move definition of ESB bits (bsc#1061840).
- powerpc/xmon: Add ISA v3.0 SPRs to SPR dump (bsc#1061840).
- powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (bsc#1068032, bsc#1080157, git-fixes).
- powerpc: Avoid code patching freed init sections (bsc#1107735).
- powerpc: Fix size calculation using resource_size() (bsc#1012382).
- powerpc: KABI add aux_ptr to hole in paca_struct to extend it with additional members (bsc#1094244).
- powerpc: KABI: move mce_data_buf into paca_aux (bsc#1094244).
- powerpc: make feature-fixup tests fortify-safe (bsc#1065729).
- powerpc: pseries: remove dlpar_attach_node dependency on full path (bsc#1113295).
- ppp: Destroy the mutex when cleanup (bsc#1051510).
- ppp: fix __percpu annotation (bsc#1051510).
- printk/tracing: Do not trace printk_nmi_enter() (bsc#1112208).
- printk: drop in_nmi check from printk_safe_flush_on_panic() (bsc#1112170).
- proc: restrict kernel stack dumps to root (git-fixes). blacklist.conf:
- pstore: Fix incorrect persistent ram buffer mapping (bsc#1051510).
- ptp: fix missing break in switch (bsc#1105355).
- ptr_ring: fail early if queue occupies more than KMALLOC_MAX_SIZE (bsc#1105355).
- ptr_ring: fix up after recent ptr_ring changes (bsc#1105355).
- ptr_ring: prevent integer overflow when calculating size (bsc#1105355).
- ptrace,x86: Make user_64bit_mode() available to 32-bit builds (bsc#1110006).
- pwm: tiehrpwm: Fix disabling of output of PWMs (bsc#1051510).
- qed: Add missing device config for RoCE EDPM in UFP mode (bsc#1109217).
- qed: Avoid sending mailbox commands when MFW is not responsive (bsc#1050536).
- qed: Do not add VLAN 0 tag to untagged frames in multi-function mode (bsc#1050536).
- qed: Fix populating the invalid stag value in multi function mode (bsc#1050536).
- qed: Fix shmem structure inconsistency between driver and the mfw (bsc#1110561).
- qed: Prevent a possible deadlock during driver load and unload (bsc#1050536).
- qed: Wait for MCP halt and resume commands to take place (bsc#1050536).
- qed: Wait for ready indication before rereading the shmem (bsc#1050536).
- qlcnic: fix Tx descriptor corruption on 82xx devices (bsc#1050540).
- qlge: Fix netdev features configuration (bsc#1098822).
- qmi_wwan: Added support for Gemalto's Cinterion ALASxx WWAN interface (bsc#1051510).
- qmi_wwan: set DTR for modems in forced USB2 mode (bsc#1051510).
- qrtr: add MODULE_ALIAS macro to smd (bsc#1051510).
- r8152: Check for supported Wake-on-LAN Modes (bsc#1051510).
- r8169: Clear RTL_FLAG_TASK_*_PENDING when clearing RTL_FLAG_TASK_ENABLED (bsc#1051510).
- r8169: add support for NCube 8168 network card (bsc#1051510).
- race of lockd inetaddr notifiers vs nlmsvc_rqst change (git-fixes).
- random: add new ioctl RNDRESEEDCRNG (bsc#1051510).
- random: fix possible sleeping allocation from irq context (bsc#1051510).
- random: mix rdrand with entropy sent in from userspace (bsc#1051510).
- random: rate limit unseeded randomness warnings (git-fixes).
- random: set up the NUMA crng instances after the CRNG is fully initialized (bsc#1051510).
- rculist: Improve documentation for list_for_each_entry_from_rcu() (bsc#1084760).
- rculist: add list_for_each_entry_from_rcu() (bsc#1084760).
- readahead: stricter check for bdi io_pages (VM Functionality, git fixes).
- regulator: fix crash caused by null driver data (bsc#1051510).
- reiserfs: add check to detect corrupted directory entry (bsc#1109818).
- reiserfs: do not panic on bad directory entries (bsc#1109818).
- reiserfs: fix broken xattr handling (heap corruption, bad retval) (bsc#1106236).
- rename a hv patch to reduce conflicts in -AZURE
- rename/renumber hv patches to simplify upcoming upstream merges Good Bye automerge. Hello Conflicts.
- rename/renumber hv patches to simplify upcoming upstream merges No code changes.
- reorder a qedi patch to allow further work in this branch
- resort series.conf
- resource: Include resource end in walk_*() interfaces (bsc#1114279).
- rhashtable: add schedule points (bsc#1051510).
- rndis_wlan: potential buffer overflow in rndis_wlan_auth_indication() (bsc#1051510).
- root dentries need RCU-delayed freeing (bsc#1106297).
- rpc_pipefs: fix double-dput() (bsc#1051510).
- rpm/kernel-binary.spec.in: fix call of split-modules split-modules is called with some parameters depending on config options. But since we do not use backslash consistelny, the call to split-modules might be evaluated so that also the following cat command is appended. Avoid this behaviour by using backslashes everywhere and add %nil to the end. This perhaps never happens, but stay on the safe side.
- rpm/mkspec: build dtbs for architectures marked -!needs_updating
- rpm/mkspec: fix ppc64 kernel-source build.
- rpmsg: Correct support for MODULE_DEVICE_TABLE() (git-fixes).
- rsi: Fix 'invalid vdd' warning in mmc (bsc#1051510).
- rtc: bq4802: add error handling for devm_ioremap (bsc#1051510).
- rtnetlink: add rtnl_link_state check in rtnl_configure_link (netfilter-stable-18_07_27).
- rxrpc: Fix user call ID check in rxrpc_service_prealloc_one (netfilter-stable-18_08_04).
- s390/crypto: Fix return code checking in cbc_paes_crypt() (bsc#1108323, LTC#171709).
- s390/entry.S: use assembler alternatives (bsc#1103421).
- s390/lib: use expoline for all bcr instructions (git-fixes, bsc#1103421).
- s390/mm: fix local TLB flushing vs. detach of an mm address space (bsc#1103421).
- s390/mm: fix race on mm->context.flush_mm (bsc#1103421).
- s390/pci: fix out of bounds access during irq setup (bsc#1108323, LTC#171068).
- s390/qdio: reset old sbal_state flags (LTC#171525, bsc#1106948).
- s390/qeth: consistently re-enable device features (bsc#1104482, LTC#170340).
- s390/qeth: do not clobber buffer on async TX completion (bsc#1104482, LTC#170340).
- s390/qeth: rely on kernel for feature recovery (bsc#1104482, LTC#170340).
- s390/qeth: use vzalloc for QUERY OAT buffer (LTC#171527, bsc#1106948).
- s390/runtime instrumentation: simplify task exit handling (bsc#1103421).
- s390: Prevent hotplug rwsem recursion (bsc#1105731).
- s390: always save and restore all registers on context switch (bsc#1103421).
- s390: detect etoken facility (bsc#1103421).
- s390: fix br_r1_trampoline for machines without exrl (git-fixes, bsc#1103421).
- s390: fix compat system call table (bsc#1103421).
- s390: fix handling of -1 in set{,fs}id16 syscalls (bsc#1103421).
- s390: use expoline thunks for all branches generated by the BPF JIT (bsc#1103421).
- samples/bpf: adjust rlimit RLIMIT_MEMLOCK for xdp1 (bsc#1083647).
- sched/fair: Fix bandwidth timer clock drift condition (Git-fixes).
- sched/fair: Fix vruntime_normalized() for remote non-migration wakeup (git-fixes).
- sched/isolcpus: Fix 'isolcpus=' boot parameter handling when !CONFIG_CPUMASK_OFFSTACK (bsc#1107207).
- sched/numa: Avoid task migration for small NUMA improvement (bsc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Do not move imbalanced load purely on the basis of an idle CPU (bsc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Evaluate move once per node (bsc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Limit the conditions where scan period is reset ().
- sched/numa: Pass destination CPU as a parameter to migrate_task_rq (bsc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Pass destination CPU as a parameter to migrate_task_rq kabi (bsc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Remove numa_has_capacity() (bsc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Remove unused task_capacity from 'struct numa_stats' (bsc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Reset scan rate whenever task moves across nodes (bsc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Stop comparing tasks for NUMA placement after selecting an idle core (bsc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Stop multiple tasks from moving to the CPU at the same time (bsc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Stop multiple tasks from moving to the CPU at the same time kabi (bsc#1101669 optimise numa balancing for fast migrate).
- sched/numa: remove unused code from update_numa_stats() (bsc#1101669 optimise numa balancing for fast migrate).
- sched/numa: remove unused nr_running field (bsc#1101669 optimise numa balancing for fast migrate).
- scripts/git_sort/git_sort.py: Add fixes branch from mkp/scsi.git.
- scripts/git_sort/git_sort.py: add libnvdimm-for-next branch
- scripts/git_sort/git_sort.py: add mkp 4.20/scsi-queue
- scripts: modpost: check memory allocation results (bsc#1051510).
- scsi: core: Allow state transitions from OFFLINE to BLOCKED (bsc#1112246).
- scsi: cxlflash: Abstract hardware dependent assignments ().
- scsi: cxlflash: Acquire semaphore before invoking ioctl services ().
- scsi: cxlflash: Adapter context init can return error ().
- scsi: cxlflash: Adapter context support for OCXL ().
- scsi: cxlflash: Add argument identifier names ().
- scsi: cxlflash: Add include guards to backend.h ().
- scsi: cxlflash: Avoid clobbering context control register value ().
- scsi: cxlflash: Enable OCXL operations ().
- scsi: cxlflash: Explicitly cache number of interrupts per context ().
- scsi: cxlflash: Handle spurious interrupts ().
- scsi: cxlflash: Hardware AFU for OCXL ().
- scsi: cxlflash: Introduce OCXL backend ().
- scsi: cxlflash: Introduce OCXL context state machine ().
- scsi: cxlflash: Introduce object handle fop ().
- scsi: cxlflash: Isolate external module dependencies ().
- scsi: cxlflash: Limit the debug logs in the IO path ().
- scsi: cxlflash: MMIO map the AFU ().
- scsi: cxlflash: Preserve number of interrupts for master contexts ().
- scsi: cxlflash: Read host AFU configuration ().
- scsi: cxlflash: Read host function configuration ().
- scsi: cxlflash: Register for translation errors ().
- scsi: cxlflash: Remove commmands from pending list on timeout ().
- scsi: cxlflash: Remove embedded CXL work structures ().
- scsi: cxlflash: Setup AFU PASID ().
- scsi: cxlflash: Setup AFU acTag range ().
- scsi: cxlflash: Setup LISNs for master contexts ().
- scsi: cxlflash: Setup LISNs for user contexts ().
- scsi: cxlflash: Setup OCXL transaction layer ().
- scsi: cxlflash: Setup function OCXL link ().
- scsi: cxlflash: Setup function acTag range ().
- scsi: cxlflash: Staging to support future accelerators ().
- scsi: cxlflash: Support AFU interrupt management ().
- scsi: cxlflash: Support AFU interrupt mapping and registration ().
- scsi: cxlflash: Support AFU reset ().
- scsi: cxlflash: Support AFU state toggling ().
- scsi: cxlflash: Support adapter context discovery ().
- scsi: cxlflash: Support adapter context mmap and release ().
- scsi: cxlflash: Support adapter context polling ().
- scsi: cxlflash: Support adapter context reading ().
- scsi: cxlflash: Support adapter file descriptors for OCXL ().
- scsi: cxlflash: Support file descriptor mapping ().
- scsi: cxlflash: Support image reload policy modification ().
- scsi: cxlflash: Support process element lifecycle ().
- scsi: cxlflash: Support process specific mappings ().
- scsi: cxlflash: Support reading adapter VPD data ().
- scsi: cxlflash: Support starting an adapter context ().
- scsi: cxlflash: Support starting user contexts ().
- scsi: cxlflash: Synchronize reset and remove ops ().
- scsi: cxlflash: Use IDR to manage adapter contexts ().
- scsi: cxlflash: Use local mutex for AFU serialization ().
- scsi: cxlflash: Yield to active send threads ().
- scsi: fcoe: hold disc_mutex when traversing rport lists (bsc#1077989).
- scsi: hisi_sas: Add SATA FIS check for v3 hw ().
- scsi: hisi_sas: Add a flag to filter PHY events during reset ().
- scsi: hisi_sas: Add missing PHY spinlock init ().
- scsi: hisi_sas: Adjust task reject period during host reset ().
- scsi: hisi_sas: Drop hisi_sas_slot_abort() ().
- scsi: hisi_sas: Fix the conflict between dev gone and host reset ().
- scsi: hisi_sas: Fix the failure of recovering PHY from STP link timeout ().
- scsi: hisi_sas: Implement handlers of PCIe FLR for v3 hw ().
- scsi: hisi_sas: Only process broadcast change in phy_bcast_v3_hw() ().
- scsi: hisi_sas: Pre-allocate slot DMA buffers ().
- scsi: hisi_sas: Release all remaining resources in clear nexus ha ().
- scsi: hisi_sas: Tidy hisi_sas_task_prep() ().
- scsi: hisi_sas: Use dmam_alloc_coherent() ().
- scsi: hisi_sas: add memory barrier in task delivery function ().
- scsi: hisi_sas: relocate some common code for v3 hw ().
- scsi: hisi_sas: tidy channel interrupt handler for v3 hw ().
- scsi: hisi_sas: tidy host controller reset function a bit ().
- scsi: hpsa: limit transfer length to 1MB, not 512kB (bsc#1102346).
- scsi: ipr: Eliminate duplicate barriers ().
- scsi: ipr: System hung while dlpar adding primary ipr adapter back (bsc#1109336).
- scsi: ipr: Use dma_pool_zalloc() ().
- scsi: ipr: fix incorrect indentation of assignment statement ().
- scsi: libfc: Add lockdep annotations (bsc#1077989).
- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1104731).
- scsi: libfc: fixup 'sleeping function called from invalid context' (bsc#1077989).
- scsi: libfc: fixup lockdep annotations (bsc#1077989).
- scsi: libfc: hold disc_mutex in fc_disc_stop_rports() (bsc#1077989).
- scsi: libfc: retry PRLI if we cannot analyse the payload (bsc#1104731).
- scsi: lpfc: Correct MDS diag and nvmet configuration (bsc#1106636).
- scsi: mpt3sas: Fix calltrace observed while running IO reset (bsc#1077989).
- scsi: netvsc: Use the vmbus function to calculate ring buffer percentage (bsc#1107207).
- scsi: qedi: Add the CRC size within iSCSI NVM image (bsc#1110538).
- scsi: qedi: Initialize the stats mutex lock (bsc#1110538).
- scsi: qla2xxx: Add appropriate debug info for invalid RX_ID (bsc#1108870).
- scsi: qla2xxx: Add logic to detect ABTS hang and response completion (bsc#1108870).
- scsi: qla2xxx: Add longer window for chip reset (bsc#1086327,).
- scsi: qla2xxx: Add mode control for each physical port (bsc#1108870).
- scsi: qla2xxx: Add support for ZIO6 interrupt threshold (bsc#1108870).
- scsi: qla2xxx: Allow FC-NVMe underrun to be handled by transport (bsc#1108870).
- scsi: qla2xxx: Check for Register disconnect (bsc#1108870).
- scsi: qla2xxx: Cleanup for N2N code (bsc#1086327,).
- scsi: qla2xxx: Decrement login retry count for only plogi (bsc#1108870).
- scsi: qla2xxx: Defer chip reset until target mode is enabled (bsc#1108870).
- scsi: qla2xxx: Fix ISP recovery on unload (bsc#1086327,).
- scsi: qla2xxx: Fix Management Server NPort handle reservation logic (bsc#1086327,).
- scsi: qla2xxx: Fix N2N link re-connect (bsc#1086327,).
- scsi: qla2xxx: Fix NVMe Target discovery (bsc#1108870).
- scsi: qla2xxx: Fix NVMe session hang on unload (bsc#1108870).
- scsi: qla2xxx: Fix Remote port registration (bsc#1108870).
- scsi: qla2xxx: Fix deadlock between ATIO and HW lock (bsc#1108870).
- scsi: qla2xxx: Fix double increment of switch scan retry count (bsc#1108870).
- scsi: qla2xxx: Fix driver hang when FC-NVMe LUNs are configured (bsc#1108870).
- scsi: qla2xxx: Fix dropped srb resource (bsc#1108870).
- scsi: qla2xxx: Fix duplicate switch database entries (bsc#1108870).
- scsi: qla2xxx: Fix duplicate switch's Nport ID entries (bsc#1108870).
- scsi: qla2xxx: Fix early srb free on abort (bsc#1108870).
- scsi: qla2xxx: Fix for double free of SRB structure (bsc#1108870).
- scsi: qla2xxx: Fix iIDMA error (bsc#1108870).
- scsi: qla2xxx: Fix incorrect port speed being set for FC adapters (bsc#1108870).
- scsi: qla2xxx: Fix issue reported by static checker for qla2x00_els_dcmd2_sp_done() (bsc#1086327,).
- scsi: qla2xxx: Fix login retry count (bsc#1086327,).
- scsi: qla2xxx: Fix memory leak for allocating abort IOCB (bsc#1111830).
- scsi: qla2xxx: Fix out of order Termination and ABTS response (bsc#1108870).
- scsi: qla2xxx: Fix port speed display on chip reset (bsc#1108870).
- scsi: qla2xxx: Fix premature command free (bsc#1108870).
- scsi: qla2xxx: Fix process response queue for ISP26XX and above (bsc#1108870).
- scsi: qla2xxx: Fix race between switch cmd completion and timeout (bsc#1086327,).
- scsi: qla2xxx: Fix race condition for resource cleanup (bsc#1108870).
- scsi: qla2xxx: Fix re-using LoopID when handle is in use (bsc#1108870).
- scsi: qla2xxx: Fix recursive mailbox timeout (bsc#1108870).
- scsi: qla2xxx: Fix redundant fc_rport registration (bsc#1086327,).
- scsi: qla2xxx: Fix session state stuck in Get Port DB (bsc#1086327,).
- scsi: qla2xxx: Fix stalled relogin (bsc#1086327,).
- scsi: qla2xxx: Fix stuck session in PLOGI state (bsc#1108870).
- scsi: qla2xxx: Fix unintended Logout (bsc#1086327,).
- scsi: qla2xxx: Flush mailbox commands on chip reset (bsc#1086327,).
- scsi: qla2xxx: Force fw cleanup on ADISC error (bsc#1108870).
- scsi: qla2xxx: Increase abort timeout value (bsc#1108870).
- scsi: qla2xxx: Migrate NVME N2N handling into state machine (bsc#1086327,).
- scsi: qla2xxx: Move ABTS code behind qpair (bsc#1108870).
- scsi: qla2xxx: Move log messages before issuing command to firmware (bsc#1108870).
- scsi: qla2xxx: Move rport registration out of internal work_list (bsc#1108870).
- scsi: qla2xxx: Move {get|rel}_sp to base_qpair struct (bsc#1108870).
- scsi: qla2xxx: Prevent sysfs access when chip is down (bsc#1086327,).
- scsi: qla2xxx: Reduce holding sess_lock to prevent CPU lock-up (bsc#1108870).
- scsi: qla2xxx: Reject bsg request if chip is down (bsc#1108870).
- scsi: qla2xxx: Remove ASYNC GIDPN switch command (bsc#1108870).
- scsi: qla2xxx: Remove all rports if fabric scan retry fails (bsc#1108870).
- scsi: qla2xxx: Remove redundant check for fcport deletion (bsc#1108870).
- scsi: qla2xxx: Remove stale ADISC_DONE event (bsc#1108870).
- scsi: qla2xxx: Remove stale debug trace message from tcm_qla2xxx (bsc#1108870).
- scsi: qla2xxx: Return switch command on a timeout (bsc#1108870).
- scsi: qla2xxx: Save frame payload size from ICB (bsc#1086327,).
- scsi: qla2xxx: Serialize mailbox request (bsc#1108870).
- scsi: qla2xxx: Silent erroneous message (bsc#1086327,).
- scsi: qla2xxx: Spinlock recursion in qla_target (bsc#1086327,).
- scsi: qla2xxx: Terminate Plogi/PRLI if WWN is 0 (bsc#1108870).
- scsi: qla2xxx: Turn off IOCB timeout timer on IOCB completion (bsc#1108870).
- scsi: qla2xxx: Update driver to version 10.00.00.09-k (bsc#1108870).
- scsi: qla2xxx: Update driver version to 10.00.00.08-k (bsc#1086327,).
- scsi: qla2xxx: Update driver version to 10.00.00.10-k (bsc#1108870).
- scsi: qla2xxx: Update driver version to 10.00.00.11-k (bsc#1108870).
- scsi: qla2xxx: Update rscn_rcvd field to more meaningful scan_needed (bsc#1108870).
- scsi: qla2xxx: Use correct qpair for ABTS/CMD (bsc#1108870).
- scsi: qla2xxx: do not allow negative thresholds (bsc#1108870).
- scsi: qla2xxx: shutdown chip if reset fail (bsc#1108870).
- scsi: storsvc: do not set a bounce limit (bsc#1107207).
- scsi: storvsc: Avoid allocating memory for temp cpumasks (bsc#1107207).
- scsi: storvsc: Select channel based on available percentage of ring buffer to write (bsc#1107207).
- scsi: storvsc: Set up correct queue depth values for IDE devices (bsc#1107207).
- scsi: target: prefer dbroot of /etc/target over /var/target (bsc#1111928).
- scsi: vmbus: Add function to report available ring buffer to write in total ring size percentage (bsc#1107207).
- scsi_debug: call resp_XXX function after setting host_scribble (bsc#1069138).
- scsi_debug: reset injection flags for every_nth > 0 (bsc#1069138).
- security: check for kstrdup() failure in lsm_append() (bsc#1051510).
- selftests/bpf/test_maps: exit child process without error in ENOMEM case (bsc#1083647).
- selftests/bpf: fix a typo in map in map test (bsc#1083647).
- selftests/x86: Add tests for User-Mode Instruction Prevention (bsc#1110006).
- selftests/x86: Add tests for the STR and SLDT instructions (bsc#1110006).
- serial: 8250: Do not service RX FIFO if interrupts are disabled (bsc#1051510).
- serial: 8250: Fix clearing FIFOs in RS485 mode again (bsc#1051510).
- serial: 8250_dw: Add ACPI support for uart on Broadcom SoC (bsc#1051510).
- serial: 8250_dw: always set baud rate in dw8250_set_termios (bsc#1051510).
- serial: 8250_exar: Read INT0 from slave device, too (bsc#1051510).
- serial: core: mark port as initialized after successful IRQ change (bsc#1051510).
- serial: cpm_uart: return immediately from console poll (bsc#1051510).
- serial: enable spi in sc16is7xx driver References: bsc#1105672
- serial: imx: restore handshaking irq for imx1 (bsc#1051510).
- serial: make sc16is7xx driver supported References: bsc#1105672
- serial: pxa: Fix an error handling path in 'serial_pxa_probe()' (bsc#1051510).
- serial: sh-sci: Stop RX FIFO timer during port shutdown (bsc#1051510).
- serial: xuartps: fix typo in cdns_uart_startup (bsc#1051510).
- series.conf: moved some Xen patches to the sorted region xen/blkfront: correct purging of persistent grants (bsc#1112514).
- signal: Properly deliver SIGSEGV from x86 uprobes (bsc#1110006).
- slab: __GFP_ZERO is incompatible with a constructor (bsc#1107060).
- smb2: fix missing files in root share directory listing (bsc#1112907).
- smb3: fill in statfs fsid and correct namelen (bsc#1112905).
- smb3: fix reset of bytes read and written stats (bsc#1112906).
- smb3: on reconnect set PreviousSessionId field (bsc#1112899).
- smsc75xx: Check for Wake-on-LAN modes (bsc#1051510).
- smsc95xx: Check for Wake-on-LAN modes (bsc#1051510).
- soc/tegra: pmc: Fix child-node lookup (bsc#1051510).
- soc: fsl: qe: Fix copy/paste bug in ucc_get_tdm_sync_shift() (bsc#1051510).
- soc: mediatek: pwrap: fix cipher init setting error (bsc#1051510).
- sock_diag: fix use-after-free read in __sk_free (bsc#1051510).
- soreuseport: initialise timewait reuseport field (bsc#1051510).
- sound: do not call skl_init_chip() to reset intel skl soc (bsc#1051510).
- sound: enable interrupt after dma buffer initialization (bsc#1051510).
- spi-nor: intel-spi: Fix number of protected range registers for BYT/LPT ().
- spi/bcm63xx-hsspi: keep pll clk enabled (bsc#1051510).
- spi: bcm-qspi: switch back to reading flash using smaller chunks (bsc#1051510).
- spi: cadence: Change usleep_range() to udelay(), for atomic context (bsc#1051510).
- spi: davinci: fix a NULL pointer dereference (bsc#1051510).
- spi: pxa2xx: Add support for Intel Ice Lake (bsc#1051510).
- spi: rspi: Fix interrupted DMA transfers (bsc#1051510).
- spi: rspi: Fix invalid SPI use during system suspend (bsc#1051510).
- spi: sh-msiof: Fix handling of write value for SISTR register (bsc#1051510).
- spi: sh-msiof: Fix invalid SPI use during system suspend (bsc#1051510).
- spi: sh-msiof: fix deferred probing (bsc#1051510).
- spi: tegra20-slink: explicitly enable/disable clock (bsc#1051510).
- squashfs metadata 2: electric boogaloo (bsc#1051510).
- squashfs: be more careful about metadata corruption (bsc#1051510).
- squashfs: more metadata hardening (bsc#1051510).
- squashfs: more metadata hardening (bsc#1051510).
- sr9800: Check for supported Wake-on-LAN modes (bsc#1051510).
- sr: get/drop reference to device in revalidate and check_events (bsc#1109979).
- staging: bcm2835-audio: Check if workqueue allocation failed ().
- staging: bcm2835-audio: Deliver indirect-PCM transfer error ().
- staging: bcm2835-audio: Disconnect and free vchi_instance on module_exit() ().
- staging: bcm2835-audio: Do not leak workqueue if open fails ().
- staging: bcm2835-audio: constify snd_pcm_ops structures ().
- staging: bcm2835-audio: make snd_pcm_hardware const ().
- staging: bcm2835-camera: fix timeout handling in wait_for_completion_timeout (bsc#1051510).
- staging: bcm2835-camera: handle wait_for_completion_timeout return properly (bsc#1051510).
- staging: comedi: ni_mio_common: fix subdevice flags for PFI subdevice (bsc#1051510).
- staging: comedi: ni_mio_common: protect register write overflow (bsc#1051510).
- staging: lustre: Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1051510).
- staging: lustre: disable preempt while sampling processor id (bsc#1051510).
- staging: lustre: fix bug in osc_enter_cache_try (bsc#1051510).
- staging: lustre: ldlm: free resource when ldlm_lock_create() fails (bsc#1051510).
- staging: lustre: libcfs: Prevent harmless read underflow (bsc#1051510).
- staging: lustre: libcfs: fix test for libcfs_ioctl_hdr minimum size (bsc#1051510).
- staging: lustre: llite: correct removexattr detection (bsc#1051510).
- staging: lustre: llite: initialize xattr->xe_namelen (bsc#1051510).
- staging: lustre: lmv: correctly iput lmo_root (bsc#1051510).
- staging: lustre: lov: use correct env in lov_io_data_version_end() (bsc#1051510).
- staging: lustre: o2iblnd: Fix FastReg map/unmap for MLX5 (bsc#1051510).
- staging: lustre: o2iblnd: Fix crash in kiblnd_handle_early_rxs() (bsc#1051510).
- staging: lustre: o2iblnd: fix race at kiblnd_connect_peer (bsc#1051510).
- staging: lustre: obd_mount: use correct niduuid suffix (bsc#1051510).
- staging: lustre: obdclass: return -EFAULT if copy_from_user() fails (bsc#1051510).
- staging: lustre: ptlrpc: kfree used instead of kvfree (bsc#1051510).
- staging: lustre: remove invariant in cl_io_read_ahead() (bsc#1051510).
- staging: lustre: statahead: remove incorrect test on agl_list_empty() (bsc#1051510).
- staging: rts5208: fix missing error check on call to rtsx_write_register (bsc#1051510).
- staging: vc04_services: Fix platform_no_drv_owner.cocci warnings ().
- staging: vc04_services: bcm2835-audio Format multiline comment ().
- staging: vc04_services: bcm2835-audio: Add blank line after declaration ().
- staging: vc04_services: bcm2835-audio: Change to unsigned int * ().
- staging: vc04_services: bcm2835-audio: add SPDX identifiers ().
- staging: vc04_services: bcm2835-audio: remove redundant license text ().
- staging: vc04_services: please do not use multiple blank lines ().
- stm: Potential read overflow in stm_char_policy_set_ioctl() (bsc#1051510).
- stmmac: fix DMA channel hang in half-duplex mode (networking-stable-18_07_19).
- string: drop __must_check from strscpy() and restore strscpy() usages in cgroup (bsc#1051510).
- strparser: Remove early eaten to fix full tcp receive buffer stall (networking-stable-18_07_19).
- sunxi-rsb: Include OF based modalias in device uevent (bsc#1051510).
- switchtec: Fix Spectre v1 vulnerability (bsc#1051510).
- sys: do not hold uts_sem while accessing userspace memory (bsc#1106995).
- sysfs: Do not return POSIX ACL xattrs via listxattr (git-fixes).
- target: log Data-Out timeouts as errors (bsc#1095805).
- target: log NOP ping timeouts as errors (bsc#1095805).
- target: split out helper for cxn timeout error stashing (bsc#1095805).
- target: stash sess_err_stats on Data-Out timeout (bsc#1095805).
- target: use ISCSI_IQN_LEN in iscsi_target_stat (bsc#1095805).
- target_core_rbd: break up free_device callback (bsc#1105524).
- target_core_rbd: use RCU in free_device (bsc#1105524).
- team: Forbid enslaving team device to itself (bsc#1051510).
- thermal: of-thermal: disable passive polling when thermal zone is disabled (bsc#1051510).
- thermal: thermal_hwmon: Convert to hwmon_device_register_with_info() (bsc#1103363).
- thermal_hwmon: Pass the originating device down to hwmon_device_register_with_info (bsc#1103363).
- thermal_hwmon: Sanitize attribute name passed to hwmon (bsc#1103363).
- ti: ethernet: cpdma: Use correct format for genpool_* (bsc#1051510).
- tools build: fix # escaping in .cmd files for future Make (git-fixes).
- tools/hv: Fix IP reporting by KVP daemon with SRIOV (bsc#1107207).
- tools/power turbostat: Read extended processor family from CPUID (bsc#1051510).
- tools/power turbostat: fix -S on UP systems (bsc#1051510).
- tools/vm/page-types.c: fix 'defined but not used' warning (bsc#1051510).
- tools/vm/slabinfo.c: fix sign-compare warning (bsc#1051510).
- tools: hv: fcopy: set 'error' in case an unknown operation was requested (bsc#1107207).
- tools: hv: fix compiler warnings about major/target_fname (bsc#1107207).
- tools: hv: include string.h in hv_fcopy_daemon (bsc#1107207).
- tools: hv: update lsvmbus to be compatible with python3 (bsc#1107207).
- tools: usb: ffs-test: Fix build on big endian systems (bsc#1051510).
- tpm: Introduce flag TPM_TRANSMIT_RAW (bsc#1082555).
- tpm: cmd_ready command can be issued only after granting locality (bsc#1082555).
- tpm: fix race condition in tpm_common_write() (bsc#1082555).
- tpm: fix use after free in tpm2_load_context() (bsc#1082555).
- tpm: separate cmd_ready/go_idle from runtime_pm (bsc#1082555).
- tpm: tpm_crb: relinquish locality on error path (bsc#1082555).
- tpm: vtpm_proxy: Implement request_locality function (bsc#1082555).
- tracepoint: Do not warn on ENOMEM (bsc#1051510).
- tracing/x86/xen: Remove zero data size trace events trace_xen_mmu_flush_tlb{_all} (bsc#1110006).
- tracing: Add barrier to trace_printk() buffer nesting modification (bsc#1112219).
- tsl2550: fix lux1_input error in low light (bsc#1051510).
- tty/ldsem: Add lockdep asserts for ldisc_sem (bsc#1105428).
- tty/ldsem: Convert to regular lockdep annotations (bsc#1105428).
- tty/ldsem: Decrement wait_readers on timeouted down_read() (bsc#1105428).
- tty/ldsem: Wake up readers after timed out down_write() (bsc#1105428).
- tty: Do not block on IO when ldisc change is pending (bsc#1105428).
- tty: Drop tty->count on tty_reopen() failure (bsc#1051510).
- tty: Hold tty_ldisc_lock() during tty_reopen() (bsc#1105428).
- tty: Simplify tty->count math in tty_reopen() (bsc#1105428).
- tty: fix data race between tty_init_dev and flush of buf (bsc#1105428).
- tty: fix termios input-speed encoding (bsc#1051510).
- tty: fix termios input-speed encoding when using BOTHER (bsc#1051510).
- tty: rocket: Fix possible buffer overwrite on register_PCI (bsc#1051510).
- tty: serial: 8250: Revert NXP SC16C2552 workaround (bsc#1051510).
- tty: serial: exar: Relocate sleep wake-up handling (bsc#1051510).
- tty: serial: lpuart: avoid leaking struct tty_struct (bsc#1051510).
- tty: vt_ioctl: fix potential Spectre v1 (bsc#1051510).
- uart: fix race between uart_put_char() and uart_shutdown() (bsc#1051510).
- ubifs: Check data node size before truncate (bsc#1051510).
- ubifs: Check for name being NULL while mounting (bsc#1051510).
- ubifs: Fix directory size calculation for symlinks (bsc#1106230).
- ubifs: Fix memory leak in lprobs self-check (bsc#1051510).
- ubifs: Fix synced_i_size calculation for xattr inodes (bsc#1051510).
- ubifs: xattr: Do not operate on deleted inodes (bsc#1051510).
- udl-kms: avoid division (bsc#1051510).
- udl-kms: change down_interruptible to down (bsc#1051510).
- udl-kms: fix crash due to uninitialized memory (bsc#1051510).
- udl-kms: handle allocation failure (bsc#1051510).
- udlfb: set optimal write delay (bsc#1051510).
- udp: Unbreak modules that rely on external __skb_recv_udp() availability (bsc#1109151).
- uio, lib: Fix CONFIG_ARCH_HAS_UACCESS_MCSAFE compilation (bsc#1098782).
- uio: potential double frees if __uio_register_device() fails (bsc#1051510).
- uio_hv_generic: fix subchannel ring mmap (bsc#1107207).
- uio_hv_generic: make ring buffer attribute for primary channel (bsc#1107207).
- uio_hv_generic: set size of ring buffer attribute (bsc#1107207).
- uio_hv_generic: support sub-channels (bsc#1107207).
- uio_hv_generic: use correct channel in isr (bsc#1107207).
- uprobes/x86: Prohibit probing on MOV SS instruction (bsc#1110006).
- uprobes/x86: Remove incorrect WARN_ON() in uprobe_init_insn() (bsc#1051510).
- uprobes: Use synchronize_rcu() not synchronize_sched() (bsc#1051510).
- usb/phy: fix PPC64 build errors in phy-fsl-usb.c (bsc#1051510).
- usb: Avoid use-after-free by flushing endpoints early in usb_set_interface() (bsc#1051510).
- usb: Do not die twice if PCI xhci host is not responding in resume (bsc#1051510).
- usb: cdc_acm: Do not leak URB buffers (bsc#1051510).
- usb: chipidea: Prevent unbalanced IRQ disable (bsc#1051510).
- usb: dwc2: Turn on uframe_sched on 'amlogic' platforms (bsc#1102881).
- usb: dwc2: Turn on uframe_sched on 'bcm' platforms (bsc#1102881).
- usb: dwc2: Turn on uframe_sched on 'his' platforms (bsc#1102881).
- usb: dwc2: Turn on uframe_sched on 'stm32f4x9_fsotg' platforms (bsc#1102881).
- usb: dwc2: fix isoc split in transfer with no data (bsc#1051510).
- usb: dwc2: gadget: Fix issue in dwc2_gadget_start_isoc() (bsc#1051510).
- usb: dwc3: change stream event enable bit back to 13 (bsc#1051510).
- usb: dwc3: pci: add support for Intel IceLake (bsc#1051510).
- usb: gadget: composite: fix delayed_status race condition when set_interface (bsc#1051510).
- usb: gadget: dwc2: fix memory leak in gadget_init() (bsc#1051510).
- usb: gadget: fotg210-udc: Fix memory leak of fotg210->ep[i] (bsc#1051510).
- usb: gadget: fsl_udc_core: check allocation return value and cleanup on failure (bsc#1051510).
- usb: gadget: fsl_udc_core: fixup struct_udc_setup documentation (bsc#1051510).
- usb: gadget: r8a66597: Fix a possible sleep-in-atomic-context bugs in r8a66597_queue() (bsc#1051510).
- usb: gadget: r8a66597: Fix two possible sleep-in-atomic-context bugs in init_controller() (bsc#1051510).
- usb: gadget: udc: renesas_usb3: fix maxpacket size of ep0 (bsc#1051510).
- usb: host: u132-hcd: Fix a sleep-in-atomic-context bug in u132_get_frame() (bsc#1051510).
- usb: misc: uss720: Fix two sleep-in-atomic-context bugs (bsc#1051510).
- usb: musb: dsps: do not disable CPPI41 irq in driver teardown (bsc#1051510).
- usb: uas: add support for more quirk flags (bsc#1051510).
- usb: wusbcore: security: cast sizeof to int for comparison (bsc#1051510).
- usb: xhci-mtk: resume USB3 roothub first (bsc#1051510).
- usb: xhci: increase CRS timeout value (bsc#1051510).
- usbip: tools: fix atoi() on non-null terminated string (bsc#1051510).
- use the new async probing feature for the hyperv drivers (bsc#1107207).
- userfaultfd: hugetlbfs: fix userfaultfd_huge_must_wait() pte access (bsc#1109739).
- userns: move user access out of the mutex (bsc#1051510).
- uwb: hwa-rc: fix memory leak at probe (bsc#1051510).
- vfio/pci: Virtualize Maximum Payload Size (bsc#1051510).
- vfio/pci: Virtualize Maximum Read Request Size (bsc#1051510).
- vfio/type1: Fix task tracking for QEMU vCPU hotplug (bsc#1051510).
- vfs/proc/kcore, x86/mm/kcore: Fix SMAP fault when dumping vsyscall user page (bsc#1110006).
- vfs: fix freeze protection in mnt_want_write_file() for overlayfs (git-fixes).
- vhost: correctly check the iova range when waking virtqueue (bsc#1051510).
- vhost: do not try to access device IOTLB when not initialized (bsc#1051510).
- vhost: reset metadata cache when initializing new IOTLB (netfilter-stable-18_08_17).
- vhost: use mutex_lock_nested() in vhost_dev_lock_vqs() (bsc#1051510).
- vhost_net: validate sock before trying to put its fd (networking-stable-18_07_19).
- video: fbdev: pxafb: clear allocated memory for video modes (bsc#1051510).
- video: goldfishfb: fix memory leak on driver remove (bsc#1051510).
- virtio: pci-legacy: Validate queue pfn (bsc#1051510).
- vmbus: do not return values for uninitalized channels (bsc#1051510).
- vmbus: do not return values for uninitalized channels (bsc#1107207).
- vmci: type promotion bug in qp_host_get_user_memory() (bsc#1105355).
- vmw_balloon: VMCI_DOORBELL_SET does not check status (bsc#1051510).
- vmw_balloon: do not use 2MB without batching (bsc#1051510).
- vmw_balloon: fix VMCI use when balloon built into kernel (bsc#1051510).
- vmw_balloon: fix inflation of 64-bit GFNs (bsc#1051510).
- vmw_balloon: remove inflation rate limiting (bsc#1051510).
- vsock: split dwork to avoid reinitializations (netfilter-stable-18_08_17).
- vti4: Do not count header length twice on tunnel setup (bsc#1051510).
- vti6: fix PMTU caching and reporting on xmit (bsc#1051510).
- vti6: remove !skb->ignore_df check from vti6_xmit() (bsc#1051510).
- vxlan: add new fdb alloc and create helpers (netfilter-stable-18_07_27).
- vxlan: fix default fdb entry netlink notify ordering during netdev create (netfilter-stable-18_07_27).
- vxlan: make netlink notify in vxlan_fdb_destroy optional (netfilter-stable-18_07_27).
- wan/fsl_ucc_hdlc: use IS_ERR_VALUE() to check return value of qe_muram_alloc (bsc#1051510).
- watchdog: Mark watchdog touch functions as notrace (git-fixes).
- wlcore: Add missing PM call for wlcore_cmd_wait_for_event_or_timeout() (bsc#1051510).
- wlcore: Set rx_status boottime_ns field on rx (bsc#1051510).
- x86-64/realmode: Add instruction suffix (bsc#1110006).
- x86/CPU/AMD: Derive CPU topology from CPUID function 0xB when available ().
- x86/CPU/AMD: Have smp_num_siblings and cpu_llc_id always be present (bsc#1110006).
- x86/CPU: Add a microcode loader callback (bsc#1110006).
- x86/CPU: Check CPU feature bits after microcode upgrade (bsc#1110006).
- x86/CPU: Modify detect_extended_topology() to return result ().
- x86/EISA: Do not probe EISA bus for Xen PV guests (bsc#1110006).
- x86/Hyper-V/hv_apic: Build the Hyper-V APIC conditionally (bsc#1107207).
- x86/Hyper-V/hv_apic: Include asm/apic.h (bsc#1107207).
- x86/KVM/VMX: Do not set l1tf_flush_l1d from vmx_handle_external_intr() (bsc#1110006).
- x86/KVM/VMX: Do not set l1tf_flush_l1d to true from vmx_l1d_flush() (bsc#1110006).
- x86/KVM/VMX: Move the l1tf_flush_l1d test to vmx_l1d_flush() (bsc#1110006).
- x86/KVM/VMX: Replace 'vmx_l1d_flush_always' with 'vmx_l1d_flush_cond' (bsc#1110006).
- x86/Kconfig: Limit NR_CPUS on 32-bit to a sane amount (bsc#1110006).
- x86/LDT: Avoid warning in 32-bit builds with older gcc (bsc#1110006).
- x86/MCE/AMD: Define a function to get SMCA bank type (bsc#1110006).
- x86/MCE: Fix stack out-of-bounds write in mce-inject.c: Flags_read() (bsc#1110006).
- x86/MCE: Remove min interval polling limitation (bsc#1110006).
- x86/MCE: Report only DRAM ECC as memory errors on AMD systems (bsc#1110006).
- x86/MCE: Serialize sysfs changes (bsc#1110006).
- x86/PCI: Make broadcom_postcore_init() check acpi_disabled (bsc#1110006).
- x86/acpi: Prevent X2APIC id 0xffffffff from being accounted (bsc#1110006).
- x86/alternatives: Fixup alternative_call_2 (bsc#1110006).
- x86/apic/vector: Fix off by one in error path (bsc#1110006).
- x86/apic: Fix restoring boot IRQ mode in reboot and kexec/kdump (bsc#1110006).
- x86/apic: Set up through-local-APIC mode on the boot CPU if 'noapic' specified (bsc#1110006).
- x86/apic: Split disable_IO_APIC() into two functions to fix CONFIG_KEXEC_JUMP=y (bsc#1110006).
- x86/apic: Split out restore_boot_irq_mode() from disable_IO_APIC() (bsc#1110006).
- x86/asm/memcpy_mcsafe: Add labels for __memcpy_mcsafe() write fault handling (bsc#1098782).
- x86/asm/memcpy_mcsafe: Add write-protection-fault handling (bsc#1098782).
- x86/asm/memcpy_mcsafe: Define copy_to_iter_mcsafe() (bsc#1098782).
- x86/asm/memcpy_mcsafe: Fix copy_to_user_mcsafe() exception handling (bsc#1098782).
- x86/asm/memcpy_mcsafe: Provide original memcpy_mcsafe_unrolled (bsc#1098782).
- x86/asm/memcpy_mcsafe: Remove loop unrolling (bsc#1098782).
- x86/asm/memcpy_mcsafe: Return bytes remaining (bsc#1098782).
- x86/asm: Add _ASM_ARG* constants for argument registers to asm/asm.h (bsc#1110006).
- x86/asm: Allow again using asm.h when building for the 'bpf' clang target (bsc#1110006).
- x86/asm: Do not use the confusing '.ifeq' directive (bsc#1110006).
- x86/boot/64: Verify alignment of the LOAD segment (bsc#1110006).
- x86/boot/KASLR: Work around firmware bugs by excluding EFI_BOOT_SERVICES_* and EFI_LOADER_* from KASLR's choice (bsc#1112878).
- x86/boot/compressed/64: Print error if 5-level paging is not supported (bsc#1110006).
- x86/boot: Fix if_changed build flip/flop bug (bsc#1110006).
- x86/boot: Fix kexec booting failure in the SEV bit detection code (bsc#1110301).
- x86/boot: Move EISA setup to a separate file (bsc#1110006).
- x86/boot: Relocate definition of the initial state of CR0 (bsc#1110006).
- x86/build/64: Force the linker to use 2MB page size (bsc#1109603).
- x86/build: Beautify build log of syscall headers (bsc#1110006).
- x86/cpu/AMD: Apply the Erratum 688 fix when the BIOS does not (bsc#1110006).
- x86/cpu/intel: Add missing TLB cpuid values (bsc#1110006).
- x86/cpufeature: Add User-Mode Instruction Prevention definitions (bsc#1110006).
- x86/cpufeatures: Add Intel PCONFIG cpufeature (bsc#1110006).
- x86/cpufeatures: Add Intel Total Memory Encryption cpufeature (bsc#1110006).
- x86/debug: Handle warnings before the notifier chain, to fix KGDB crash (bsc#1110006).
- x86/decoder: Add new TEST instruction pattern (bsc#1110006).
- x86/dumpstack: Save first regs set for the executive summary (bsc#1110006).
- x86/dumpstack: Unify show_regs() (bsc#1110006).
- x86/efi: Fix efi_call_phys_epilog() with CONFIG_X86_5LEVEL=y (bsc#1110006).
- x86/eisa: Add missing include (bsc#1110006).
- x86/entry/64: Add two more instruction suffixes (bsc#1110006).
- x86/entry/64: Remove %ebx handling from error_entry/exit (bsc#1102715).
- x86/entry/64: Use 'xorl' for faster register clearing (bsc#1110006).
- x86/entry/64: Wipe KASAN stack shadow before rewind_stack_do_exit() (bsc#1110006).
- x86/entry: Reduce the code footprint of the 'idtentry' macro (bsc#1110006).
- x86/entry: Use SYSCALL_DEFINE() macros for sys_modify_ldt() (bsc#1110006).
- x86/espfix/64: Fix espfix double-fault handling on 5-level systems (bsc#1110006).
- x86/events/intel/ds: Fix bts_interrupt_threshold alignment (git-fixes c1961a4631da).
- x86/fpu/debug: Remove unused 'x86_fpu_state' and 'x86_fpu_deactivate_state' tracepoints (bsc#1110006).
- x86/fpu: Make XSAVE check the base CPUID features before enabling (bsc#1110006).
- x86/fpu: Parse clearcpuid= as early XSAVE argument (bsc#1110006).
- x86/fpu: Remove second definition of fpu in __fpu__restore_sig() (bsc#1110006).
- x86/fpu: Remove the explicit clearing of XSAVE dependent features (bsc#1110006).
- x86/headers/UAPI: Use __u64 instead of u64 in uapi/asm/hyperv.h (bsc#1107207).
- x86/hyper-V: Allocate the IDT entry early in boot (bsc#1107207).
- x86/hyper-v: Check cpumask_to_vpset() return value in hyperv_flush_tlb_others_ex() (bsc#1107207).
- x86/hyper-v: Check for VP_INVAL in hyperv_flush_tlb_others() (bsc#1107207).
- x86/hyper-v: Fix the circular dependency in IPI enlightenment (bsc#1107207).
- x86/hyper-v: Fix wrong merge conflict resolution (bsc#1107207).
- x86/hyper-v: Implement hv_do_fast_hypercall16 (bsc#1107207).
- x86/hyper-v: Trace PV IPI send (bsc#1107207).
- x86/hyper-v: Use 'fast' hypercall for HVCALL_SEND_IPI (bsc#1107207).
- x86/hyper-v: Use cheaper HVCALL_FLUSH_VIRTUAL_ADDRESS_{LIST,SPACE} hypercalls when possible (bsc#1107207).
- x86/hyper-v: Use cheaper HVCALL_SEND_IPI hypercall when possible (bsc#1107207).
- x86/hyper-v: allocate and use Virtual Processor Assist Pages (bsc#1107207).
- x86/hyper-v: define struct hv_enlightened_vmcs and clean field bits (bsc#1107207).
- x86/hyper-v: detect nested features (bsc#1107207).
- x86/hyper-v: move definitions from TLFS to hyperv-tlfs.h (bsc#1107207).
- x86/hyper-v: move hyperv.h out of uapi (bsc#1107207).
- x86/hyper-v: move struct hv_flush_pcpu{,ex} definitions to common header (bsc#1107207).
- x86/hyper-v: rename ipi_arg_{ex,non_ex} structures (bsc#1107207).
- x86/hyperv: Add a function to read both TSC and TSC page value simulateneously (bsc#1107207).
- x86/hyperv: Add interrupt handler annotations (bsc#1107207).
- x86/hyperv: Check for required priviliges in hyperv_init() (bsc#1107207).
- x86/hyperv: Check for required priviliges in hyperv_init() (bsc#1110006).
- x86/hyperv: Redirect reenlightment notifications on CPU offlining (bsc#1107207).
- x86/hyperv: Reenlightenment notifications support (bsc#1107207).
- x86/idt: Load idt early in start_secondary (bsc#1110006).
- x86/init: fix build with CONFIG_SWAP=n (bsc#1106121).
- x86/intel_rdt: Enable CMT and MBM on new Skylake stepping (bsc#1110006).
- x86/intel_rdt: Fix incorrect returned value when creating rdgroup sub-directory in resctrl file system (bsc#1110006).
- x86/intel_rdt: Fix potential deadlock during resctrl mount (bsc#1110006).
- x86/intel_rdt: Fix potential deadlock during resctrl unmount (bsc#1110006).
- x86/irq: Count Hyper-V reenlightenment interrupts (bsc#1107207).
- x86/irq: Remove an old outdated comment about context tracking races (bsc#1110006).
- x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772).
- x86/kasan/64: Teach KASAN about the cpu_entry_area (kasan).
- x86/kasan: Panic if there is not enough memory to boot (bsc#1110006).
- x86/kexec: Avoid double free_page() upon do_kexec_load() failure (bsc#1110006).
- x86/kexec: Correct KEXEC_BACKUP_SRC_END off-by-one error (bsc#1114279).
- x86/kexec: Make kexec (mostly) work in 5-level paging mode (bsc#1110006).
- x86/kprobes: Fix kernel crash when probing .entry_trampoline code (bsc#1110006).
- x86/kvm/hyper-v: add reenlightenment MSRs support (bsc#1107207).
- x86/kvm/hyper-v: inject #GP only when invalid SINTx vector is unmasked (bsc#1107207).
- x86/kvm/hyper-v: remove stale entries from vec_bitmap/auto_eoi_bitmap on vector change (bsc#1107207).
- x86/kvm/vmx: Remove duplicate l1d flush definitions (bsc#1110006).
- x86/kvm: fix LAPIC timer drift when guest uses periodic mode (bsc#1106240).
- x86/kvm: rename HV_X64_MSR_APIC_ASSIST_PAGE to HV_X64_MSR_VP_ASSIST_PAGE (bsc#1107207).
- x86/mce/AMD: Get address from already initialized block (bsc#1110006).
- x86/mce: Add notifier_block forward declaration (bsc#1110006).
- x86/mce: Check for alternate indication of machine check recovery on Skylake (bsc#1110006).
- x86/mce: Do not overwrite MCi_STATUS in mce_no_way_out() (bsc#1110006).
- x86/mce: Fix incorrect 'Machine check from unknown source' message (bsc#1110006).
- x86/mce: Fix set_mce_nospec() to avoid #GP fault (bsc#1107783).
- x86/mce: Improve error message when kernel cannot recover (bsc#1110006).
- x86/mce: Improve error message when kernel cannot recover (bsc#1110301).
- x86/mcelog: Get rid of RCU remnants (git-fixes 5de97c9f6d85).
- x86/memory_failure: Introduce {set, clear}_mce_nospec() (bsc#1107783).
- x86/microcode/intel: Check microcode revision before updating sibling threads (bsc#1110006).
- x86/microcode/intel: Fix memleak in save_microcode_patch() (bsc#1110006).
- x86/microcode/intel: Look into the patch cache first (bsc#1110006).
- x86/microcode/intel: Save microcode patch unconditionally (bsc#1110006).
- x86/microcode/intel: Writeback and invalidate caches before updating microcode (bsc#1110006).
- x86/microcode: Allow late microcode loading with SMT disabled (bsc#1110006).
- x86/microcode: Attempt late loading only when new microcode is present (bsc#1110006).
- x86/microcode: Do not exit early from __reload_late() (bsc#1110006).
- x86/microcode: Do not upload microcode if CPUs are offline (bsc#1110006).
- x86/microcode: Fix CPU synchronization routine (bsc#1110006).
- x86/microcode: Get rid of struct apply_microcode_ctx (bsc#1110006).
- x86/microcode: Make sure boot_cpu_data.microcode is up-to-date (bsc#1110006).
- x86/microcode: Make the late update update_lock a raw lock for RT (bsc#1110006).
- x86/microcode: Propagate return value from updating functions (bsc#1110006).
- x86/microcode: Request microcode on the BSP (bsc#1110006).
- x86/microcode: Synchronize late microcode loading (bsc#1110006).
- x86/microcode: Update the new microcode revision unconditionally (bsc#1110006).
- x86/mm/32: Initialize the CR4 shadow before __flush_tlb_all() (bsc#1110006).
- x86/mm/64: Rename the register_page_bootmem_memmap() 'size' parameter to 'nr_pages' (bsc#1110006).
- x86/mm/kasan: Do not use vmemmap_populate() to initialize shadow (kasan).
- x86/mm/kmmio: Fix mmiotrace for page unaligned addresses (bsc#1110006).
- x86/mm/kmmio: Make the tracer robust against L1TF (bsc#1110006).
- x86/mm/memory_hotplug: determine block size based on the end of boot memory (bsc#1108243).
- x86/mm/pat: Make set_memory_np() L1TF safe (bsc#1110006).
- x86/mm/pat: Prepare {reserve, free}_memtype() for 'decoy' addresses (bsc#1107783).
- x86/mm/pti: Add an overflow check to pti_clone_pmds() (bsc#1110006).
- x86/mm/pti: Fix PTI comment in entry_SYSCALL_64() (bsc#1110006).
- x86/mm/tlb: Always use lazy TLB mode (bsc#1105467 Reduce IPIs and atomic ops with improved lazy TLB).
- x86/mm/tlb: Leave lazy TLB mode at page table free time (bsc#1105467 Reduce IPIs and atomic ops with improved lazy TLB).
- x86/mm/tlb: Make lazy TLB mode lazier (bsc#1105467 Reduce IPIs and atomic ops with improved lazy TLB).
- x86/mm/tlb: Only send page table free TLB flush to lazy TLB CPUs (bsc#1105467 Reduce IPIs and atomic ops with improved lazy TLB).
- x86/mm/tlb: Restructure switch_mm_irqs_off() (bsc#1105467 Reduce IPIs and atomic ops with improved lazy TLB).
- x86/mm/tlb: Skip atomic operations for 'init_mm' in switch_mm_irqs_off() (bsc#1105467 Reduce IPIs and atomic ops with improved lazy TLB).
- x86/mm: Add TLB purge to free pmd/pte page interfaces (bsc#1110006).
- x86/mm: Define _PAGE_TABLE using _KERNPG_TABLE (bsc#1110006).
- x86/mm: Disable ioremap free page handling on x86-PAE (bsc#1110006).
- x86/mm: Do not forbid _PAGE_RW before init for __ro_after_init (bsc#1110006).
- x86/mm: Drop TS_COMPAT on 64-bit exec() syscall (bsc#1110006).
- x86/mm: Expand static page table for fixmap space (bsc#1110006).
- x86/mm: Fix ELF_ET_DYN_BASE for 5-level paging (bsc#1110006).
- x86/mm: Fix bogus warning during EFI bootup, use boot_cpu_has() instead of this_cpu_has() in build_cr3_noflush() (bsc#1110006).
- x86/mm: Relocate page fault error codes to traps.h (bsc#1110006).
- x86/mm: Remove in_nmi() warning from vmalloc_fault() (bsc#1110006).
- x86/mm: implement free pmd/pte page interfaces (bsc#1110006).
- x86/mpx: Do not allow MPX if we have mappings above 47-bit (bsc#1110006).
- x86/nmi: Fix NMI uaccess race against CR3 switching (bsc#1110006).
- x86/numa_emulation: Fix emulated-to-physical node mapping (bsc#1110006).
- x86/oprofile: Fix bogus GCC-8 warning in nmi_setup() (bsc#1110006).
- x86/pae: use 64 bit atomic xchg function in native_ptep_get_and_clear (bsc#1110006).
- x86/paravirt: Fix some warning messages (bsc#1065600).
- x86/paravirt: Fix spectre-v2 mitigations for paravirt guests (bsc#1065600).
- x86/paravirt: Remove 'noreplace-paravirt' cmdline option (bsc#1110006).
- x86/percpu: Fix this_cpu_read() (bsc#1110006).
- x86/pgtable: Do not set huge PUD/PMD on non-leaf entries (bsc#1110006).
- x86/pkeys: Do not special case protection key 0 (bsc#1110006).
- x86/pkeys: Override pkey when moving away from PROT_EXEC (bsc#1110006).
- x86/platform/UV: Add adjustable set memory block size function (bsc#1108243).
- x86/platform/UV: Add kernel parameter to set memory block size (bsc#1108243).
- x86/platform/UV: Mark memblock related init code and data correctly (bsc#1108243).
- x86/platform/UV: Use new set memory block size function (bsc#1108243).
- x86/power: Fix swsusp_arch_resume prototype (bsc#1110006).
- x86/process: Do not mix user/kernel regs in 64bit __show_regs() (bsc#1110006).
- x86/process: Re-export start_thread() (bsc#1110006).
- x86/pti: Check the return value of pti_user_pagetable_walk_p4d() (bsc#1110006).
- x86/pti: Check the return value of pti_user_pagetable_walk_pmd() (bsc#1110006).
- x86/retpoline/checksum32: Convert assembler indirect jumps (bsc#1110006).
- x86/retpoline/irq32: Convert assembler indirect jumps (bsc#1110006).
- x86/smp: fix non-SMP broken build due to redefinition of apic_id_is_primary_thread (bsc#1110006).
- x86/smpboot: Do not use mwait_play_dead() on AMD systems (bsc#1110006).
- x86/spectre: Add missing family 6 check to microcode check (git-fixes a5b296636453).
- x86/spectre: Fix spelling mistake: 'vunerable'-> 'vulnerable' (bsc#1110006).
- x86/speculation, objtool: Annotate indirect calls/jumps for objtool on 32-bit kernels (bsc#1110006).
- x86/speculation/l1tf: Exempt zeroed PTEs from inversion (bsc#1110006).
- x86/speculation/l1tf: Extend 64bit swap file size limit (bsc#1110006).
- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bsc#1105536).
- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bsc#1105536).
- x86/speculation/l1tf: Fix up pte->pfn conversion for PAE (bsc#1110006).
- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bsc#1105536).
- x86/speculation/l1tf: Invert all not present mappings (bsc#1110006).
- x86/speculation/l1tf: Make pmd/pud_mknotpresent() invert (bsc#1110006).
- x86/speculation/l1tf: Protect PAE swap entries against L1TF (bsc#1110006).
- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bsc#1105536).
- x86/speculation: Simplify sysfs report of VMX L1TF vulnerability (bsc#1110006).
- x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry (bsc#1106369).
- x86/time: Correct the attribute on jiffies' definition (bsc#1110006).
- x86/topology: Update the 'cpu cores' field in /proc/cpuinfo correctly across CPU hotplug operations (bsc#1110006).
- x86/tsc: Add missing header to tsc_msr.c (bsc#1110006).
- x86/tsc: Allow TSC calibration without PIT (bsc#1110006).
- x86/tsc: Prevent 32bit truncation in calc_hpet_ref() (bsc#1110006).
- x86/vdso: Fix asm constraints on vDSO syscall fallbacks (bsc#1110006).
- x86/vdso: Fix lsl operand order (bsc#1110006).
- x86/vdso: Fix lsl operand order (bsc#1110301).
- x86/vdso: Fix vDSO syscall fallback asm constraint regression (bsc#1110006).
- x86/xen/efi: Initialize only the EFI struct members used by Xen (bsc#1107945).
- x86/xen: Add call of speculative_store_bypass_ht_init() to PV paths (bsc#1065600).
- x86/xen: Delay get_cpu_cap until stack canary is established (bsc#1110006).
- x86/xen: Drop 5-level paging support code from the XEN_PV code (bsc#1110006).
- x86/xen: Reset VCPU0 info pointer after shared_info remap (bsc#1110006).
- x86/xen: do not write ptes directly in 32-bit PV guests (bsc#1110006).
- x86: Add check for APIC access address for vmentry of L2 guests (bsc#1110006).
- x86: Call fixup_exception() before notify_die() in math_error() (bsc#1110006).
- x86: Delay skip of emulated hypercall instruction (bsc#1107207).
- x86: Delay skip of emulated hypercall instruction (bsc#1110006).
- x86: PM: Make APM idle driver initialize polling state (bsc#1110006).
- x86: i8259: Add missing include file (bsc#1110006).
- x86: irq_remapping: Move irq remapping mode enum ().
- x86: kvm: avoid unused variable warning (bsc#1110006).
- x86: msr-index.h: Correct SNB_C1/C3_AUTO_UNDEMOTE defines (bsc#1110006).
- x86: msr-index.h: Correct SNB_C1/C3_AUTO_UNDEMOTE defines (bsc#1110301).
- xen-netfront: fix bug concerning replacement of MAX_SKB_FRAGS with XEN_NETIF_NR_SLOTS_MIN (bsc#1104824).
- xen-netfront: fix queue name setting (bsc#1065600).
- xen-netfront: fix warn message as irq device name has '/' (bsc#1065600).
- xen-swiotlb: fix the check condition for xen_swiotlb_free_coherent (bsc#1065600).
- xen/PVH: Set up GS segment for stack canary (bsc#1110006).
- xen/blkback: do not keep persistent grants too long (bsc#1085042).
- xen/blkback: move persistent grants flags to bool (bsc#1085042).
- xen/blkback: remove unused pers_gnts_lock from struct (bsc#1085042).
- xen/blkfront: cleanup stale persistent grants (bsc#1085042).
- xen/blkfront: reorder tests in xlblk_init() (bsc#1085042).
- xen/gntdev: avoid out of bounds access in case of partial gntdev_mmap() (bsc#1065600).
- xen/x86/vpmu: Zero struct pt_regs before calling into sample handling code (bsc#1110006).
- xen: Fix {set,clear}_foreign_p2m_mapping on autotranslating guests (bsc#1110006).
- xen: Remove unnecessary BUG_ON from __unbind_from_irq() (bsc#1065600).
- xen: avoid crash in disable_hotplug_cpu (bsc#1106594).
- xen: issue warning message when out of grant maptrack entries (bsc#1105795).
- xen: xenbus_dev_frontend: Fix XS_TRANSACTION_END handling (bsc#1065600).
- xen: xenbus_dev_frontend: Really return response string (bsc#1065600).
- xenbus: track caller request id (bsc#1065600).
- xfrm: use complete IPv6 addresses for hash (bsc#1109330).
- xfs, dax: introduce xfs_dax_aops (bsc#1104888).
- xfs: Fix per-inode DAX flag inheritance (Git-fixes bsc#1109511).
- xfs: Remove dead code from inode recover function (bsc#1105396).
- xfs: add a new xfs_iext_lookup_extent_before helper (bsc#1095344).
- xfs: add a xfs_bmap_fork_to_state helper (bsc#1095344).
- xfs: add a xfs_iext_update_extent helper (bsc#1095344).
- xfs: add asserts for the mmap lock in xfs_{insert,collapse}_file_space (bsc#1095344).
- xfs: add comments documenting the rebalance algorithm (bsc#1095344).
- xfs: add some comments to xfs_iext_insert/xfs_iext_insert_node (bsc#1095344).
- xfs: allow unaligned extent records in xfs_bmbt_disk_set_all (bsc#1095344).
- xfs: do not create overlapping extents in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: do not fail when converting shortform attr to long form during ATTR_REPLACE (bsc#1105025).
- xfs: do not rely on extent indices in xfs_bmap_collapse_extents (bsc#1095344).
- xfs: do not rely on extent indices in xfs_bmap_insert_extents (bsc#1095344).
- xfs: do not set XFS_BTCUR_BPRV_WASDEL in xfs_bunmapi (bsc#1095344).
- xfs: fix memory leak in xfs_iext_free_last_leaf (bsc#1095344).
- xfs: fix number of records handling in xfs_iext_split_leaf (bsc#1095344).
- xfs: fix type usage (bsc#1095344).
- xfs: handle zero entries case in xfs_iext_rebalance_leaf (bsc#1095344).
- xfs: inline xfs_shift_file_space into callers (bsc#1095344).
- xfs: introduce the xfs_iext_cursor abstraction (bsc#1095344).
- xfs: iterate backwards in xfs_reflink_cancel_cow_blocks (bsc#1095344).
- xfs: iterate over extents in xfs_bmap_extents_to_btree (bsc#1095344).
- xfs: iterate over extents in xfs_iextents_copy (bsc#1095344).
- xfs: make better use of the 'state' variable in xfs_bmap_del_extent_real (bsc#1095344).
- xfs: merge xfs_bmap_read_extents into xfs_iread_extents (bsc#1095344).
- xfs: move pre/post-bmap tracing into xfs_iext_update_extent (bsc#1095344).
- xfs: move some code around inside xfs_bmap_shift_extents (bsc#1095344).
- xfs: move some more code into xfs_bmap_del_extent_real (bsc#1095344).
- xfs: move xfs_bmbt_irec and xfs_exntst_t to xfs_types.h (bsc#1095344).
- xfs: move xfs_iext_insert tracepoint to report useful information (bsc#1095344).
- xfs: pass a struct xfs_bmbt_irec to xfs_bmbt_lookup_eq (bsc#1095344).
- xfs: pass a struct xfs_bmbt_irec to xfs_bmbt_update (bsc#1095344).
- xfs: pass an on-disk extent to xfs_bmbt_validate_extent (bsc#1095344).
- xfs: pass struct xfs_bmbt_irec to xfs_bmbt_validate_extent (bsc#1095344).
- xfs: preserve i_rdev when recycling a reclaimable inode (bsc#1095344).
- xfs: refactor delalloc accounting in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: refactor dir2 leaf readahead shadow buffer cleverness (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_hole_delay (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_hole_real (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_unwritten_real (bsc#1095344).
- xfs: refactor xfs_del_extent_real (bsc#1095344).
- xfs: remove XFS_BMAP_MAX_SHIFT_EXTENTS (bsc#1095344).
- xfs: remove XFS_BMAP_TRACE_EXLIST (bsc#1095344).
- xfs: remove a duplicate assignment in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: remove a superflous assignment in xfs_iext_remove_node (bsc#1095344).
- xfs: remove all xfs_bmbt_set_* helpers except for xfs_bmbt_set_all (bsc#1095344).
- xfs: remove if_rdev (bsc#1095344).
- xfs: remove post-bmap tracing in xfs_bmap_local_to_extents (bsc#1095344).
- xfs: remove support for inlining data/extents into the inode fork (bsc#1095344).
- xfs: remove the never fully implemented UUID fork format (bsc#1095344).
- xfs: remove the nr_extents argument to xfs_iext_insert (bsc#1095344).
- xfs: remove the nr_extents argument to xfs_iext_remove (bsc#1095344).
- xfs: remove xfs_bmbt_get_state (bsc#1095344).
- xfs: remove xfs_bmse_shift_one (bsc#1095344).
- xfs: rename bno to end in __xfs_bunmapi (bsc#1095344).
- xfs: repair malformed inode items during log recovery (bsc#1105396).
- xfs: replace xfs_bmbt_lookup_ge with xfs_bmbt_lookup_first (bsc#1095344).
- xfs: replace xfs_qm_get_rtblks with a direct call to xfs_bmap_count_leaves (bsc#1095344).
- xfs: rewrite getbmap using the xfs_iext_* helpers (bsc#1095344).
- xfs: rewrite xfs_bmap_count_leaves using xfs_iext_get_extent (bsc#1095344).
- xfs: rewrite xfs_bmap_first_unused to make better use of xfs_iext_get_extent (bsc#1095344).
- xfs: simplify the xfs_getbmap interface (bsc#1095344).
- xfs: simplify xfs_reflink_convert_cow (bsc#1095344).
- xfs: split xfs_bmap_shift_extents (bsc#1095344).
- xfs: switch xfs_bmap_local_to_extents to use xfs_iext_insert (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_hole_delay (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_hole_real (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_unwritten_real (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_collapse_extents (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_del_extent_* (bsc#1095344).
- xfs: trivial indentation fixup for xfs_iext_remove_node (bsc#1095344).
- xfs: update got in xfs_bmap_shift_update_extent (bsc#1095344).
- xfs: use a b+tree for the in-core extent list (bsc#1095344).
- xfs: use correct state defines in xfs_bmap_del_extent_{cow,delay} (bsc#1095344).
- xfs: use the state defines in xfs_bmap_del_extent_real (bsc#1095344).
- xfs: use xfs_bmap_del_extent_delay for the data fork as well (bsc#1095344).
- xfs: use xfs_iext_*_extent helpers in xfs_bmap_shift_extents (bsc#1095344).
- xfs: use xfs_iext_*_extent helpers in xfs_bmap_split_extent_at (bsc#1095344).
- xfs: use xfs_iext_get_extent in xfs_bmap_first_unused (bsc#1095344).
- xfs: use xfs_iext_get_extent instead of open coding it (bsc#1095344).
- xhci: Add missing CAS workaround for Intel Sunrise Point xHCI (bsc#1051510).
- xhci: Do not print a warning when setting link state for disabled ports (bsc#1051510).
- xhci: Fix use after free for URB cancellation on a reallocated endpoint (bsc#1051510).
- zram: fix null dereference of handle (bsc#1105355).
Patchnames
SUSE-SLE-Module-Public-Cloud-15-2018-2819
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-9363: Fixed an integer overflow that could have been used for an out of bounds write with no additional execution privileges needed. User interaction is not needed for exploitation (bsc#1105292).\n- CVE-2018-6555: The irda_setsockopt function in net/irda/af_irda.c was fixed in drivers/staging/irda/net/af_irda.c that allowed local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket (bsc#1106511).\n- CVE-2018-6554: Fixed memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c that allowed local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket (bsc#1106509).\n- CVE-2018-18710: An information leak was fixed in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c that could have been used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bsc#1113751).\n- CVE-2018-18445: Fixed faulty computation of numeric bounds in the BPF verifier that now permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandled 32-bit right shifts (bsc#1112372).\n- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c was fixed that was vulnerable to sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations. (bsc#1108399).\n- CVE-2018-16658: An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c was fixed that could have leed to be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 (bsc#1107689).\n- CVE-2018-15572: The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c was not always fill RSB upon a context switch, which makes it easier for attackers to conduct userspace-userspace spectreRSB attacks. (bsc#1102517)\n- CVE-2018-14633: A security flaw was fixed in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely (bsc#1107829).\n- CVE-2018-14617: A NULL pointer dereference and panic in hfsplus_lookup() was fixed when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory. (bsc#1102870)\n- CVE-2018-14613: An invalid pointer dereference in io_ctl_map_page() was fixed when mounting and operating a crafted btrfs image, because of a lack of block group item validation in check_leaf_item in fs/btrfs/tree-checker.c. (bsc#1102896)\n- CVE-2018-13095: A denial of service (memory corruption and BUG) was fixed to prevent a corrupted xfs image upon encountering an inode that is in extent format, but has more extents than fit in the inode fork. (bsc#1099999)\n- CVE-2018-13093: A NULL pointer dereference and panic in lookup_slow() on a NULL was fixed to prevent pathwalks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during allocation. (bsc#1100001)\n- CVE-2018-12896: An integer overflow in the POSIX timer code was fixed to prevent overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls. (bsc#1099922)\n- CVE-2018-1129: The signature calculation was fixed to by the cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable. (bsc#1096748)\n- CVE-2018-1128: The cephx authentication protocol was fixed to verify ceph clients correctly and to prevent the vulnerability to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network could have used this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable (bsc#1096748).\n- CVE-2018-10940: The cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c was fixed to prevent local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bsc#1092903).\n- CVE-2018-10938: A flaw was fixed how the kernel handled network packet sent remotely by an attacker that may forced the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a denial-of-service. A certain non-default configuration of LSM (Linux Security Module) and NetLabel should be set up on a system before an attacker could leverage this flaw. (bsc#1106016)\n- CVE-2018-10902: The the raw midi kernel driver was fixed to be protected against concurrent access which could have lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation (bsc#1105322).\n- CVE-2017-18224: fs/ocfs2/aops.c omits use of a semaphore and consequently had a race condition for access to the extent tree during read operations in DIRECT mode, which allows local users to cause a denial of service (BUG) by modifying a certain e_cpos field (bsc#1084831).\n- CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bsc#1066674).\n\n\nThe following security bug was previously fixed by has now an assigned CVE number:\n\n- CVE-2018-18386: drivers/tty/n_tty.c in the Linux kernel allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).\n\n\nThe following non-security bugs were fixed:\n\n- /dev/mem: Add bounce buffer for copy-out (git-fixes).\n- /dev/mem: Avoid overwriting 'err' in read_mem() (git-fixes).\n- 9p/net: Fix zero-copy path in the 9p virtio transport (bsc#1051510).\n- 9p/virtio: fix off-by-one error in sg list bounds check (bsc#1051510).\n- 9p: fix multiple NULL-pointer-dereferences (bsc#1051510).\n- ACPI / APEI: Remove ghes_ioremap_area (bsc#1051510).\n- ACPI / EC: Add another entry for Thinkpad X1 Carbon 6th (bsc#1051510).\n- ACPI / EC: Add parameter to force disable the GPE on suspend (bsc#1051510).\n- ACPI / EC: Use ec_no_wakeup on ThinkPad X1 Yoga 3rd (bsc#1051510).\n- ACPI / EC: Use ec_no_wakeup on Thinkpad X1 Carbon 6th (bsc#1051510).\n- ACPI / EC: Use ec_no_wakeup on more Thinkpad X1 Carbon 6th systems (bsc#1051510).\n- ACPI / PCI: pci_link: Allow the absence of _PRS and change log level (bsc#1104172).\n- ACPI / PM: save NVS memory for ASUS 1025C laptop (bsc#1051510).\n- ACPI / bus: Only call dmi_check_system on X86 (bsc#1105597, bsc#1106178).\n- ACPI / processor: Fix the return value of acpi_processor_ids_walk() (bsc#1051510).\n- ACPI / scan: Initialize status to ACPI_STA_DEFAULT (bsc#1051510).\n- ACPI/IORT: Remove temporary iort_get_id_mapping_index() ACPICA guard (bsc#1103387).\n- ACPI/PCI: pci_link: reduce verbosity when IRQ is enabled (bsc#1104172).\n- ACPICA: Reference Counts: increase max to 0x4000 for large servers (bsc#1108241).\n- ACPICA: iasl: Add SMMUv3 device ID mapping index support (bsc#1103387).\n- ALSA: bebob: fix memory leak for M-Audio FW1814 and ProjectMix I/O at error path (bsc#1051510).\n- ALSA: bebob: use address returned by kmalloc() instead of kernel stack for streaming DMA mapping (bsc#1051510).\n- ALSA: cs46xx: Deliver indirect-PCM transfer error ().\n- ALSA: cs5535audio: Fix invalid endian conversion (bsc#1051510).\n- ALSA: emu10k1: Deliver indirect-PCM transfer error ().\n- ALSA: emu10k1: fix possible info leak to userspace on SNDRV_EMU10K1_IOCTL_INFO (bsc#1051510).\n- ALSA: fireface: fix memory leak in ff400_switch_fetching_mode() (bsc#1051510).\n- ALSA: firewire-digi00x: fix memory leak of private data (bsc#1051510).\n- ALSA: firewire-tascam: fix memory leak of private data (bsc#1051510).\n- ALSA: fireworks: fix memory leak of response buffer at error path (bsc#1051510).\n- ALSA: hda - Add mic quirk for the Lenovo G50-30 (17aa:3905) (bsc#1051510).\n- ALSA: hda - Add quirk for ASUS G751 laptop (bsc#1051510).\n- ALSA: hda - Fix cancel_work_sync() stall from jackpoll work (bsc#1051510).\n- ALSA: hda - Fix headphone pin config for ASUS G751 (bsc#1051510).\n- ALSA: hda - Sleep for 10ms after entering D3 on Conexant codecs (bsc#1051510).\n- ALSA: hda - Turn CX8200 into D3 as well upon reboot (bsc#1051510).\n- ALSA: hda/realtek - Cannot adjust speaker's volume on Dell XPS 27 7760 (bsc#1051510).\n- ALSA: hda/realtek - Fix the problem of the front MIC on the Lenovo M715 (bsc#1051510).\n- ALSA: hda: Add 2 more models to the power_save blacklist (bsc#1051510).\n- ALSA: hda: Add AZX_DCAPS_PM_RUNTIME for AMD Raven Ridge (bsc#1051510).\n- ALSA: hda: Correct Asrock B85M-ITX power_save blacklist entry (bsc#1051510).\n- ALSA: hda: fix unused variable warning (bsc#1051510).\n- ALSA: memalloc: Do not exceed over the requested size (bsc#1051510).\n- ALSA: mips: Deliver indirect-PCM transfer error ().\n- ALSA: msnd: Fix the default sample sizes (bsc#1051510).\n- ALSA: oxfw: fix memory leak for model-dependent data at error path (bsc#1051510).\n- ALSA: oxfw: fix memory leak of discovered stream formats at error path (bsc#1051510).\n- ALSA: oxfw: fix memory leak of private data (bsc#1051510).\n- ALSA: pcm: Fix negative appl_ptr handling in pcm-indirect helpers ().\n- ALSA: pcm: Fix snd_interval_refine first/last with open min/max (bsc#1051510).\n- ALSA: pcm: Simplify forward/rewind codes ().\n- ALSA: pcm: Use a common helper for PCM state check and hwsync ().\n- ALSA: pcm: Workaround for weird PulseAudio behavior on rewind error ().\n- ALSA: rme32: Deliver indirect-PCM transfer error ().\n- ALSA: usb-audio: Fix multiple definitions in AU0828_DEVICE() macro (bsc#1051510).\n- ALSA: usb-audio: update quirk for B W PX to remove microphone (bsc#1051510).\n- ALSA: virmidi: Fix too long output trigger loop (bsc#1051510).\n- ALSA: vx222: Fix invalid endian conversions (bsc#1051510).\n- ALSA: vxpocket: Fix invalid endian conversions (bsc#1051510).\n- ARM: 8780/1: ftrace: Only set kernel memory back to read-only after boot (bsc#1051510).\n- ARM: 8799/1: mm: fix pci_ioremap_io() offset check (bsc#1051510).\n- ARM: DRA7/OMAP5: Enable ACTLR[0] (Enable invalidates of BTB) for secondary cores (bsc#1051510).\n- ARM: bcm2835: Add GET_THROTTLED firmware property (bsc#1108468).\n- ARM: exynos: Clear global variable on init error path (bsc#1051510).\n- ARM: hisi: check of_iomap and fix missing of_node_put (bsc#1051510).\n- ARM: hisi: fix error handling and missing of_node_put (bsc#1051510).\n- ARM: hisi: handle of_iomap and fix missing of_node_put (bsc#1051510).\n- ARM: hwmod: RTC: Do not assume lock/unlock will be called with irq enabled (bsc#1051510).\n- ARM: imx: flag failure of of_iomap (bsc#1051510).\n- ARM: imx_v4_v5_defconfig: Select ULPI support (bsc#1051510).\n- ARM: imx_v6_v7_defconfig: Select ULPI support (bsc#1051510).\n- ARM: mvebu: declare asm symbols as character arrays in pmsu.c (bsc#1051510).\n- ARM: pxa: irq: fix handling of ICMR registers in suspend/resume (bsc#1051510).\n- ASoC: Intel: Skylake: Reset the controller in probe (bsc#1051510).\n- ASoC: Intel: cht_bsw_max98090: remove useless code, align with ChromeOS driver (bsc#1051510).\n- ASoC: Intel: cht_bsw_max98090_ti: Fix jack initialization (bsc#1051510).\n- ASoC: cs4265: fix MMTLR Data switch control (bsc#1051510).\n- ASoC: dapm: Fix potential DAI widget pointer deref when linking DAIs (bsc#1051510).\n- ASoC: intel: skylake: Add missing break in skl_tplg_get_token() (bsc#1051510).\n- ASoC: msm8916-wcd-digital: fix RX2 MIX1 and RX3 MIX1 (bsc#1051510).\n- ASoC: rsnd: adg: care clock-frequency size (bsc#1051510).\n- ASoC: rsnd: do not fallback to PIO mode when -EPROBE_DEFER (bsc#1051510).\n- ASoC: rsnd: fixup not to call clk_get/set under non-atomic (bsc#1051510).\n- ASoC: rsnd: move rsnd_ssi_config_init() execute condition into it (bsc#1051510).\n- ASoC: rsnd: update pointer more accurate (bsc#1051510).\n- ASoC: rt5514: Add the I2S ASRC support (bsc#1051510).\n- ASoC: rt5514: Add the missing register in the readable table (bsc#1051510).\n- ASoC: rt5514: Eliminate the noise in the ASRC case (bsc#1051510).\n- ASoC: rt5514: Fix the issue of the delay volume applied (bsc#1051510).\n- ASoC: rt5514: Fix the issue of the delay volume applied again (bsc#1051510).\n- ASoC: sigmadsp: safeload should not have lower byte limit (bsc#1051510).\n- ASoC: wm8804: Add ACPI support (bsc#1051510).\n- ASoC: wm8994: Fix missing break in switch (bsc#1051510).\n- Apparmor fixes from git-fixes\n- Backport stable-patches for x86 architecture\n- Bluetooth: Add a new Realtek 8723DE ID 0bda:b009 (bsc#1051510).\n- Bluetooth: Use lock_sock_nested in bt_accept_enqueue (bsc#1051510).\n- Bluetooth: avoid killing an already killed socket (bsc#1051510).\n- Bluetooth: btsdio: Do not bind to non-removable BCM43430 (bsc#1103587).\n- Bluetooth: h5: Fix missing dependency on BT_HCIUART_SERDEV (bsc#1051510).\n- Bluetooth: hidp: Fix handling of strncpy for hid->name information (bsc#1051510).\n- Bluetooth: hidp: buffer overflow in hidp_process_report (bsc#1051510).\n- Btrfs: fix data corruption when deduplicating between different files (bsc#1110647).\n- Btrfs: fix duplicate extents after fsync of file with prealloc extents (bsc#1110644).\n- Btrfs: fix file data corruption after cloning a range and fsync (bsc#1111901).\n- Btrfs: fix fsync after hole punching when using no-holes feature (bsc#1110642).\n- Btrfs: fix loss of prealloc extents past i_size after fsync log replay (bsc#1110643).\n- Btrfs: fix mount failure after fsync due to hard link recreation (bsc#1103543).\n- Btrfs: fix return value on rename exchange failure (bsc#1110645).\n- Btrfs: fix send failure when root has deleted files still open (bsc#1110650).\n- Btrfs: rework outstanding_extents (dependency for bsc#1031392).\n- Btrfs: send, fix invalid access to commit roots due to concurrent snapshotting (bsc#1111904).\n- Btrfs: sync log after logging new name (bsc#1110646).\n- CIFS: check for STATUS_USER_SESSION_DELETED (bsc#1112902).\n- Cleanup out-of-tree subsection\n- Disable DRM patches that broke vbox video driver KMP (bsc#1111076)\n- Do not leak MNT_INTERNAL away from internal mounts (git-fixes).\n- Documentation/l1tf: Fix small spelling typo (bsc#1051510).\n- Documentation: add some docs for errseq_t (bsc#1107008).\n- Documentation: ip-sysctl.txt: document addr_gen_mode (bsc#1051510).\n- Drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bsc#1107207).\n- Drivers: hv: vmbus: Add comments on ring buffer signaling (bsc#1107207).\n- Drivers: hv: vmbus: Cleanup synic memory free path (bsc#1107207).\n- Drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#1107207).\n- Drivers: hv: vmbus: Fix the offer_in_progress in vmbus_process_offer() (bsc#1051510).\n- Drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1107207).\n- Drivers: hv: vmbus: Implement Direct Mode for stimer0 (bsc#1107207).\n- Drivers: hv: vmbus: Make TLFS #define names architecture neutral (bsc#1107207).\n- Drivers: hv: vmbus: Remove use of slow_virt_to_phys() (bsc#1107207).\n- Drivers: hv: vmbus: Remove x86 MSR refs in arch independent code (bsc#1107207).\n- Drivers: hv: vmbus: Remove x86-isms from arch independent drivers (bsc#1107207).\n- Drivers: hv: vmbus: Removed an unnecessary cast from void * (bsc#1107207).\n- Drivers: hv: vmbus: Reset the channel callback in vmbus_onoffer_rescind() (bsc#1107207).\n- Drivers: hv: vmbus: Use get/put_cpu() in vmbus_connect() (bsc#1107207).\n- Drivers: hv: vmbus: add numa_node to sysfs (bsc#1107207).\n- Drivers: hv: vmbus: do not mark HV_PCIE as perf_device (bsc#1051510).\n- Drivers: hv: vmbus: enable VMBus protocol version 5.0 (bsc#1107207).\n- Drivers: hv: vmbus: respect what we get from hv_get_synint_state() (bsc#1107207).\n- Drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bsc#1107207).\n- EDAC, ghes: Add DDR4 and NVDIMM memory types (bsc#1099125).\n- EDAC, i7core: Fix memleaks and use-after-free on probe and remove (bsc#1051510).\n- EDAC, skx: Fix skx_edac build error when ACPI_NFIT=m (bsc#1099125).\n- EDAC, skx_edac: Detect non-volatile DIMMs (bsc#1099125).\n- EDAC, thunderx: Fix memory leak in thunderx_l2c_threaded_isr() (bsc#1114279).\n- EDAC: Add new memory type for non-volatile DIMMs (bsc#1099125).\n- EDAC: Fix memleak in module init error path (bsc#1051510).\n- EDAC: Raise the maximum number of memory controllers (bsc#1113780).\n- Filesystem and FUSE fixes from upstream\n- Fix kexec forbidding kernels signed with keys in the secondary keyring to boot (bsc#1110006).\n- HID: add quirk for another PIXART OEM mouse used by HP (bsc#1051510).\n- HID: add support for Apple Magic Keyboards (bsc#1051510).\n- HID: hid-ntrig: add error handling for sysfs_create_group (bsc#1051510).\n- HID: hid-saitek: Add device ID for RAT 7 Contagion (bsc#1051510).\n- HID: hid-sensor-hub: Force logical minimum to 1 for power and report state (bsc#1051510).\n- HID: i2c-hid: Add no-irq-after-reset quirk for 0911:5288 device ().\n- HID: quirks: fix support for Apple Magic Keyboards (bsc#1051510).\n- HID: sensor-hub: Restore fixup for Lenovo ThinkPad Helix 2 sensor hub report (bsc#1051510).\n- IB/IPoIB: Set ah valid flag in multicast send flow (bsc#1046307 ).\n- IB/core: type promotion bug in rdma_rw_init_one_mr() (bsc#1046306).\n- IB/hfi1: Invalid NUMA node information can cause a divide by zero (bsc#1060463).\n- IB/hfi1: Remove incorrect call to do_interrupt callback (bsc#1060463).\n- IB/hfi1: Set in_use_ctxts bits for user ctxts only (bsc#1060463 ).\n- IB/ipoib: Avoid a race condition between start_xmit and cm_rep_handler (bsc#1046307).\n- IB/ipoib: Fix error return code in ipoib_dev_init() (bsc#1046307 ).\n- IB/mlx4: Test port number before querying type (bsc#1046302 ).\n- IB/mlx4: Use 4K pages for kernel QP's WQE buffer (bsc#1046302 ).\n- IB/mlx5: fix uaccess beyond 'count' in debugfs read/write handlers (bsc#1046305).\n- Input: atakbd - fix Atari CapsLock behaviour (bsc#1051510).\n- Input: atakbd - fix Atari keymap (bsc#1051510).\n- Input: atmel_mxt_ts - only use first T9 instance (bsc#1051510).\n- Input: edt-ft5x06 - fix error handling for factory mode on non-M06 (bsc#1051510).\n- Input: edt-ft5x06 - implement support for the EDT-M12 series (bsc#1051510).\n- Input: edt-ft5x06 - make distinction between m06/m09/generic more clear (bsc#1051510).\n- Input: elantech - enable middle button of touchpad on ThinkPad P72 (bsc#1051510).\n- Input: synaptics-rmi4 - fix axis-swap behavior (bsc#1051510).\n- KABI: hide new member in struct iommu_table from genksyms (bsc#1061840).\n- KABI: move the new handler to end of machdep_calls and hide it from genksyms (bsc#1094244).\n- KABI: powerpc: export __find_linux_pte as __find_linux_pte_or_hugepte (bsc#1061840).\n- KABI: tpm: change relinquish_locality return value back to void (bsc#1082555).\n- KABI: tpm: do keep the cmd_ready and go_idle as pm ops (bsc#1082555).\n- KVM/VMX: Optimize vmx_vcpu_run() and svm_vcpu_run() by marking the RDMSR path as unlikely() (bsc#1110006).\n- KVM/x86: remove WARN_ON() for when vm_munmap() fails (bsc#1106240).\n- KVM: Enforce error in ioctl for compat tasks when !KVM_COMPAT (bsc#1106240).\n- KVM: PPC: Add pt_regs into kvm_vcpu_arch and move vcpu->arch.gpr[] into it (bsc#1061840).\n- KVM: PPC: Avoid marking DMA-mapped pages dirty in real mode (bsc#1061840).\n- KVM: PPC: Book 3S HV: Do ptesync in radix guest exit path (bsc#1061840).\n- KVM: PPC: Book3S HV: Add 'online' register to ONE_REG interface (bsc#1061840).\n- KVM: PPC: Book3S HV: Add of_node_put() in success path (bsc#1061840).\n- KVM: PPC: Book3S HV: Allow HPT and radix on the same core for POWER9 v2.2 (bsc#1061840).\n- KVM: PPC: Book3S HV: Allow creating max number of VCPUs on POWER9 (bsc#1061840).\n- KVM: PPC: Book3S HV: Avoid crash from THP collapse during radix page fault (bsc#1061840).\n- KVM: PPC: Book3S HV: Avoid shifts by negative amounts (bsc#1061840).\n- KVM: PPC: Book3S HV: Check DR not IR to chose real vs virt mode MMIOs (bsc#1061840).\n- KVM: PPC: Book3S HV: Do SLB load/unload with guest LPCR value loaded (bsc#1061840).\n- KVM: PPC: Book3S HV: Do not truncate HPTE index in xlate function (bsc#1061840).\n- KVM: PPC: Book3S HV: Do not use compound_order to determine host mapping size (bsc#1061840).\n- KVM: PPC: Book3S HV: Do not use existing 'prodded' flag for XIVE escalations (bsc#1061840).\n- KVM: PPC: Book3S HV: Enable migration of decrementer register (bsc#1061840).\n- KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix VRMA initialization with 2MB or 1GB memory backing (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix conditions for starting vcpu (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix constant size warning (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix duplication of host SLB entries (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix guest r11 corruption with POWER9 TM workarounds (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix handling of large pages in radix page fault handler (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix handling of secondary HPTEG in HPT resizing code (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix inaccurate comment (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix kvmppc_bad_host_intr for real mode interrupts (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix trap number return from __kvmppc_vcore_entry (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix typo in kvmppc_hv_get_dirty_log_radix() (bsc#1061840).\n- KVM: PPC: Book3S HV: Handle 1GB pages in radix page fault handler (bsc#1061840).\n- KVM: PPC: Book3S HV: Improve handling of debug-trigger HMIs on POWER9 (bsc#1061840).\n- KVM: PPC: Book3S HV: Keep XIVE escalation interrupt masked unless ceded (bsc#1061840).\n- KVM: PPC: Book3S HV: Lockless tlbie for HPT hcalls (bsc#1061840).\n- KVM: PPC: Book3S HV: Make HPT resizing work on POWER9 (bsc#1061840).\n- KVM: PPC: Book3S HV: Make radix clear pte when unmapping (bsc#1061840).\n- KVM: PPC: Book3S HV: Make radix use correct tlbie sequence in kvmppc_radix_tlbie_page (bsc#1061840).\n- KVM: PPC: Book3S HV: Make xive_pushed a byte, not a word (bsc#1061840).\n- KVM: PPC: Book3S HV: Pack VCORE IDs to access full VCPU ID space (bsc#1061840).\n- KVM: PPC: Book3S HV: Radix page fault handler optimizations (bsc#1061840).\n- KVM: PPC: Book3S HV: Read kvm->arch.emul_smt_mode under kvm->lock (bsc#1061840).\n- KVM: PPC: Book3S HV: Recursively unmap all page table entries when unmapping (bsc#1061840).\n- KVM: PPC: Book3S HV: Remove useless statement (bsc#1061840).\n- KVM: PPC: Book3S HV: Remove vcpu->arch.dec usage (bsc#1061840).\n- KVM: PPC: Book3S HV: Send kvmppc_bad_interrupt NMIs to Linux handlers (bsc#1061840).\n- KVM: PPC: Book3S HV: Set RWMR on POWER8 so PURR/SPURR count correctly (bsc#1061840).\n- KVM: PPC: Book3S HV: Snapshot timebase offset on guest entry (bsc#1061840).\n- KVM: PPC: Book3S HV: Streamline setting of reference and change bits (bsc#1061840).\n- KVM: PPC: Book3S HV: Use __gfn_to_pfn_memslot() in page fault handler (bsc#1061840).\n- KVM: PPC: Book3S HV: Use a helper to unmap ptes in the radix fault path (bsc#1061840).\n- KVM: PPC: Book3S HV: Use correct pagesize in kvm_unmap_radix() (bsc#1061840, git-fixes).\n- KVM: PPC: Book3S HV: XIVE: Resend re-routed interrupts on CPU priority change (bsc#1061840).\n- KVM: PPC: Book3S HV: radix: Do not clear partition PTE when RC or write bits do not match (bsc#1061840).\n- KVM: PPC: Book3S HV: radix: Refine IO region partition scope attributes (bsc#1061840).\n- KVM: PPC: Book3S PR: Add guest MSR parameter for kvmppc_save_tm()/kvmppc_restore_tm() (bsc#1061840).\n- KVM: PPC: Book3S PR: Move kvmppc_save_tm/kvmppc_restore_tm to separate file (bsc#1061840).\n- KVM: PPC: Book3S: Add MMIO emulation for VMX instructions (bsc#1061840).\n- KVM: PPC: Book3S: Allow backing bigger guest IOMMU pages with smaller physical pages (bsc#1061840).\n- KVM: PPC: Book3S: Check KVM_CREATE_SPAPR_TCE_64 parameters (bsc#1061840).\n- KVM: PPC: Book3S: Eliminate some unnecessary checks (bsc#1061840).\n- KVM: PPC: Book3S: Fix compile error that occurs with some gcc versions (bsc#1061840).\n- KVM: PPC: Book3S: Fix guest DMA when guest partially backed by THP pages (bsc#1077761, git-fixes, bsc#1103948, bsc#1103949).\n- KVM: PPC: Book3S: Fix matching of hardware and emulated TCE tables (bsc#1061840).\n- KVM: PPC: Book3S: Use correct page shift in H_STUFF_TCE (bsc#1061840).\n- KVM: PPC: Fix a mmio_host_swabbed uninitialized usage issue (bsc#1061840).\n- KVM: PPC: Make iommu_table::it_userspace big endian (bsc#1061840).\n- KVM: PPC: Move nip/ctr/lr/xer registers to pt_regs in kvm_vcpu_arch (bsc#1061840).\n- KVM: PPC: Use seq_puts() in kvmppc_exit_timing_show() (bsc#1061840).\n- KVM: SVM: Add MSR-based feature support for serializing LFENCE (bsc#1106240).\n- KVM: VMX: Do not allow reexecute_instruction() when skipping MMIO instr (bsc#1106240).\n- KVM: VMX: Tell the nested hypervisor to skip L1D flush on vmentry (bsc#1106240).\n- KVM: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).\n- KVM: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).\n- KVM: VMX: raise internal error for exception during invalid protected mode state (bsc#1110006).\n- KVM: VMX: support MSR_IA32_ARCH_CAPABILITIES as a feature MSR (bsc#1106240).\n- KVM: X86: Fix reserved bits check for MOV to CR3 (bsc#1110006).\n- KVM: X86: Introduce kvm_get_msr_feature() (bsc#1106240).\n- KVM: X86: fix incorrect reference of trace_kvm_pi_irte_update (bsc#1110006).\n- KVM: hyperv: idr_find needs RCU protection (bsc#1107207).\n- KVM: introduce kvm_make_vcpus_request_mask() API (bsc#1107207).\n- KVM: lapic: stop advertising DIRECTED_EOI when in-kernel IOAPIC is in use (bsc#1110006).\n- KVM: nVMX: Do not expose MPX VMX controls when guest MPX disabled (bsc#1106240).\n- KVM: nVMX: Do not flush TLB when vmcs12 uses VPID (bsc#1106240).\n- KVM: nVMX: Do not halt vcpu when L1 is injecting events to L2 (bsc#1110006).\n- KVM: nVMX: Fix injection to L2 when L1 do not intercept external-interrupts (bsc#1106240).\n- KVM: nVMX: Fix races when sending nested PI while dest enters/leaves L2 (bsc#1106240).\n- KVM: nVMX: Re-evaluate L1 pending events when running L2 and L1 got posted-interrupt (bsc#1106240).\n- KVM: s390: add etoken support for guests (bsc#1106948, LTC#171029).\n- KVM: s390: force bp isolation for VSIE (bsc#1103421).\n- KVM: s390: implement CPU model only facilities (bsc#1106948, LTC#171029).\n- KVM: vmx: track host_state.loaded using a loaded_vmcs pointer (bsc#1110006).\n- KVM: vmx: use local variable for current_vmptr when emulating VMPTRST (bsc#1110006).\n- KVM: x86: Add a framework for supporting MSR-based features (bsc#1106240).\n- KVM: x86: Change __kvm_apic_update_irr() to also return if max IRR updated (bsc#1106240).\n- KVM: x86: Default to not allowing emulation retry in kvm_mmu_page_fault (bsc#1106240).\n- KVM: x86: Do not re-{try,execute} after failed emulation in L2 (bsc#1106240).\n- KVM: x86: Do not use kvm_x86_ops->mpx_supported() directly (bsc#1106240).\n- KVM: x86: Invert emulation re-execute behavior to make it opt-in (bsc#1106240).\n- KVM: x86: Merge EMULTYPE_RETRY and EMULTYPE_ALLOW_REEXECUTE (bsc#1106240).\n- KVM: x86: SVM: Call x86_spec_ctrl_set_guest/host() with interrupts disabled (git-fixes 1f50ddb4f418).\n- KVM: x86: Update cpuid properly when CR4.OSXAVE or CR4.PKE is changed (bsc#1110006).\n- KVM: x86: VMX: hyper-v: Enlightened MSR-Bitmap support (bsc#1107207).\n- KVM: x86: define SVM/VMX specific kvm_arch_[alloc|free]_vm (bsc#1111506).\n- KVM: x86: ensure all MSRs can always be KVM_GET/SET_MSR'd (bsc#1107207).\n- KVM: x86: fix #UD address of failed Hyper-V hypercalls (bsc#1107207).\n- KVM: x86: fix #UD address of failed Hyper-V hypercalls (bsc#1110006).\n- KVM: x86: fix APIC page invalidation (bsc#1106240).\n- KVM: x86: fix escape of guest dr6 to the host (bsc#1110006).\n- KVM: x86: hyperv: do rep check for each hypercall separately (bsc#1107207).\n- KVM: x86: hyperv: simplistic HVCALL_FLUSH_VIRTUAL_ADDRESS_{LIST,SPACE} implementation (bsc#1107207).\n- KVM: x86: hyperv: simplistic HVCALL_FLUSH_VIRTUAL_ADDRESS_{LIST,SPACE}_EX implementation (bsc#1107207).\n- KVM: x86: hyperv: use defines when parsing hypercall parameters (bsc#1107207).\n- KVM: x86: remove APIC Timer periodic/oneshot spikes (bsc#1110006).\n- Kbuild: fix # escaping in .cmd files for future Make (git-fixes).\n- Limit kernel-source build to architectures for which we build binaries (bsc#1108281).\n- MAINTAINERS: fix location of ina2xx.txt device tree file (bsc#1051510).\n- NET: stmmac: align DMA stuff to largest cache line length (netfilter-stable-18_08_01).\n- NFC: Fix possible memory corruption when handling SHDLC I-Frame commands (bsc#1051510).\n- NFC: nfcmrvl_uart: fix OF child-node lookup (bsc#1051510).\n- NFC: trf7970a: fix check of clock frequencies (bsc#1051510).\n- NFS/filelayout: Fix racy setting of fl->dsaddr in filelayout_check_deviceid() (bsc#1105190).\n- NFS: Avoid quadratic search when freeing delegations (bsc#1084760).\n- NFS: Use an appropriate work queue for direct-write completion (bsc#1082519).\n- NFSv4 client live hangs after live data migration recovery (git-fixes).\n- NFSv4: Fix a sleep in atomic context in nfs4_callback_sequence() (git-fixes).\n- NFSv4: Fix possible 1-byte stack overflow in nfs_idmap_read_and_verify_message (git-fixes).\n- Netperf performance issue due to AppArmor net mediation (bsc#1108520)\n- PCI/ASPM: Fix link_state teardown on device removal (bsc#1051510).\n- PCI/portdrv: Compute MSI/MSI-X IRQ vectors after final allocation (bsc#1109806).\n- PCI/portdrv: Factor out Interrupt Message Number lookup (bsc#1109806).\n- PCI: Add PCI resource type mask #define (bsc#1105355).\n- PCI: Add pci_resize_resource() for resizing BARs (bsc#1105355).\n- PCI: Add resizable BAR infrastructure (bsc#1105355).\n- PCI: Allow release of resources that were never assigned (bsc#1105355).\n- PCI: Cleanup PCI_REBAR_CTRL_BAR_SHIFT handling (bsc#1105355).\n- PCI: Match Root Port's MPS to endpoint's MPSS as necessary (bsc#1109269).\n- PCI: OF: Fix I/O space page leak (git-fixes).\n- PCI: Reprogram bridge prefetch registers on resume (bsc#1051510).\n- PCI: Restore resized BAR state on resume (bsc#1105355).\n- PCI: Skip MPS logic for Virtual Functions (VFs) (bsc#1051510).\n- PCI: aardvark: Fix I/O space page leak (git-fixes).\n- PCI: aardvark: Size bridges before resources allocation (bsc#1109806).\n- PCI: designware: Fix I/O space page leak (bsc#1109806).\n- PCI: dwc: Fix scheduling while atomic issues (git-fixes).\n- PCI: faraday: Add missing of_node_put() (bsc#1109806).\n- PCI: faraday: Fix I/O space page leak (bsc#1109806).\n- PCI: hotplug: Do not leak pci_slot on registration failure (bsc#1051510).\n- PCI: hv: Convert remove_lock to refcount (bsc#1107207).\n- PCI: hv: Do not wait forever on a device that has disappeared (bsc#1107207).\n- PCI: hv: Do not wait forever on a device that has disappeared (bsc#1109806).\n- PCI: hv: Fix return value check in hv_pci_assign_slots() (bsc#1107207).\n- PCI: hv: Make sure the bus domain is really unique (git-fixes).\n- PCI: hv: Remove unused reason for refcount handler (bsc#1107207).\n- PCI: hv: Replace GFP_ATOMIC with GFP_KERNEL in new_pcichild_device() (bsc#1107207).\n- PCI: hv: Use effective affinity mask (bsc#1107207).\n- PCI: hv: Use list_for_each_entry() (bsc#1107207).\n- PCI: hv: support reporting serial number as slot information (bsc#1107207).\n- PCI: mvebu: Fix I/O space end address calculation (bsc#1051510).\n- PCI: pciehp: Fix unprotected list iteration in IRQ handler (bsc#1051510).\n- PCI: pciehp: Fix use-after-free on unplug (bsc#1051510).\n- PCI: versatile: Fix I/O space page leak (bsc#1109806).\n- PCI: xgene: Fix I/O space page leak (bsc#1109806).\n- PCI: xilinx-nwl: Add missing of_node_put() (bsc#1109806).\n- PCI: xilinx: Add missing of_node_put() (bsc#1109806).\n- PM / Domains: Fix error path during attach in genpd (bsc#1051510).\n- PM / Domains: Fix genpd to deal with drivers returning 1 from ->prepare() (bsc#1051510).\n- PM / clk: signedness bug in of_pm_clk_add_clks() (bsc#1051510).\n- PM / core: Clear the direct_complete flag on errors (bsc#1051510).\n- PM / runtime: Drop usage count for suppliers at device link removal (bsc#1100132).\n- PM / sleep: wakeup: Fix build error caused by missing SRCU support (bsc#1051510).\n- PM: cpuidle: Fix cpuidle_poll_state_init() prototype (bsc#1110006).\n- RAID10 BUG_ON in raise_barrier when force is true and conf->barrier is 0 (git-fixes).\n- RDMA/bnxt_re: Fix a bunch of off by one bugs in qplib_fp.c (bsc#1050244).\n- RDMA/bnxt_re: Fix a couple off by one bugs (bsc#1050244 ).\n- RDMA/bnxt_re: Fix system crash during RDMA resource initialization (bsc#1086283).\n- RDMA/i40w: Hold read semaphore while looking after VMA (bsc#1058659).\n- RDMA/uverbs: Expand primary and alt AV port checks (bsc#1046306 ).\n- Squashfs: Compute expected length from inode size rather than block length (bsc#1051510).\n- Tools: hv: Fix a bug in the key delete code (bsc#1107207).\n- USB: Add quirk to support DJI CineSSD (bsc#1051510).\n- USB: add quirk for WORLDE Controller KS49 or Prodipe MIDI 49C USB controller (bsc#1051510).\n- USB: cdc-wdm: do not enable interrupts in USB-giveback (bsc#1051510).\n- USB: fix error handling in usb_driver_claim_interface() (bsc#1051510).\n- USB: handle NULL config in usb_find_alt_setting() (bsc#1051510).\n- USB: net2280: Fix erroneous synchronization change (bsc#1051510).\n- USB: option: add support for DW5821e (bsc#1051510).\n- USB: remove LPM management from usb_driver_claim_interface() (bsc#1051510).\n- USB: serial: cypress_m8: fix interrupt-out transfer length (bsc#1051510).\n- USB: serial: io_ti: fix array underflow in completion handler (bsc#1051510).\n- USB: serial: kobil_sct: fix modem-status error handling (bsc#1051510).\n- USB: serial: pl2303: add a new device id for ATEN (bsc#1051510).\n- USB: serial: sierra: fix potential deadlock at close (bsc#1051510).\n- USB: serial: simple: add Motorola Tetra MTP6550 id (bsc#1051510).\n- USB: serial: ti_usb_3410_5052: fix array underflow in completion handler (bsc#1051510).\n- USB: yurex: Check for truncation in yurex_read() (bsc#1051510).\n- USB: yurex: Fix buffer over-read in yurex_write() (bsc#1051510).\n- Update config files, make CRYPTO_CRCT10DIF_PCLMUL built-in (bsc#1105603).\n- VFS: do not test owner for NFS in set_posix_acl() (bsc#1103405).\n- Workaround for mysterious NVMe breakage with i915 CFL (bsc#1111040).\n- Workaround kABI breakage by __must_check drop of strscpy() (bsc#1051510).\n- X86/Hyper-V: Add flush HvFlushGuestPhysicalAddressSpace hypercall support (bsc#1107207).\n- X86/Hyper-V: Add hyperv_nested_flush_guest_mapping ftrace support (bsc#1107207).\n- X86/Hyper-V: Consolidate code for converting cpumask to vpset (bsc#1107207).\n- X86/Hyper-V: Consolidate the allocation of the hypercall input page (bsc#1107207).\n- X86/Hyper-V: Enable IPI enlightenments (bsc#1107207).\n- X86/Hyper-V: Enhanced IPI enlightenment (bsc#1107207).\n- X86/Hyper-V: Enlighten APIC access (bsc#1107207).\n- acpi, nfit: Add function to look up nvdimm device and provide SMBIOS handle (bsc#1099125).\n- affs_lookup(): close a race with affs_remove_link() (bsc#1105355).\n- ahci: Add Intel Ice Lake LP PCI ID (bsc#1051510).\n- aio: fix io_destroy(2) vs. lookup_ioctx() race (git-fixes).\n- apparmor: Check buffer bounds when mapping permissions mask (git-fixes).\n- apparmor: Fix failure to audit context info in build_change_hat (bsc#1051510).\n- apparmor: Fix regression in profile conflict logic (bsc#1106427)\n- apparmor: Fully initialize aa_perms struct when answering userspace query (bsc#1051510).\n- apparmor: ensure that undecidable profile attachments fail (bsc#1106427).\n- apparmor: fix an error code in __aa_create_ns() (bsc#1106427).\n- apparmor: fix mediation of prlimit (bsc#1051510).\n- apparmor: fix memory leak when deduping profile load (bsc#1051510).\n- apparmor: fix ptrace read check (bsc#1051510).\n- apparmor: remove no-op permission check in policy_unpack (bsc#1106427).\n- arm/asm/tlb.h: Fix build error implicit func declaration (bsc#1105467 Reduce IPIs and atomic ops with improved lazy TLB).\n- arm64/acpi: Create arch specific cpu to acpi id helper (bsc#1106903).\n- arm64/kasan: do not allocate extra shadow memory (bsc#1106897).\n- arm64/mm/kasan: do not use vmemmap_populate() to initialize shadow (bsc#1106898).\n- arm64: Enforce BBM for huge IO/VMAP mappings (bsc#1106890).\n- arm64: Ignore hardware dirty bit updates in ptep_set_wrprotect() (bsc#1108010).\n- arm64: Make sure permission updates happen for pmd/pud (bsc#1106891).\n- arm64: dma-mapping: clear buffers allocated with FORCE_CONTIGUOUS flag (bsc#1106902).\n- arm64: enable thunderx gpio driver\n- arm64: export memblock_reserve()d regions via /proc/iomem (bsc#1106892).\n- arm64: fix unwind_frame() for filtered out fn for function graph tracing (bsc#1106900).\n- arm64: fix vmemmap BUILD_BUG_ON() triggering on !vmemmap setups (bsc#1106896).\n- arm64: fpsimd: Avoid FPSIMD context leakage for the init task (bsc#1106894).\n- arm64: kasan: avoid pfn_to_nid() before page array is initialized (bsc#1106899).\n- arm64: mm: Ensure writes to swapper are ordered wrt subsequent cache maintenance (bsc#1106906).\n- arm64: mm: check for upper PAGE_SHIFT bits in pfn_valid() (bsc#1106893).\n- arm64: move patches to sorted section\n- arm64: numa: rework ACPI NUMA initialization (bsc#1106905).\n- arm64: vgic-v2: Fix proxying of cpuif access (bsc#1106901).\n- asix: Check for supported Wake-on-LAN modes (bsc#1051510).\n- ata: Fix ZBC_OUT all bit handling (bsc#1051510).\n- ata: Fix ZBC_OUT command block check (bsc#1051510).\n- ata: libahci: Allow reconfigure of DEVSLP register (bsc#1051510).\n- ata: libahci: Correct setting of DEVSLP register (bsc#1051510).\n- ath10k: disable bundle mgmt tx completion event support (bsc#1051510).\n- ath10k: fix kernel panic issue during pci probe (bsc#1051510).\n- ath10k: fix scan crash due to incorrect length calculation (bsc#1051510).\n- ath10k: fix use-after-free in ath10k_wmi_cmd_send_nowait (bsc#1051510).\n- ath10k: prevent active scans on potential unusable channels (bsc#1051510).\n- ath10k: protect ath10k_htt_rx_ring_free with rx_ring.lock (bsc#1051510).\n- ath10k: update the phymode along with bandwidth change request (bsc#1051510).\n- ath9k: add MSI support ().\n- ath9k: report tx status on EOSP (bsc#1051510).\n- ath9k_hw: fix channel maximum power level test (bsc#1051510).\n- atm: Preserve value of skb->truesize when accounting to vcc (networking-stable-18_07_19).\n- atm: horizon: Fix irq release error (bsc#1105355).\n- atm: zatm: Fix potential Spectre v1 (networking-stable-18_07_19).\n- atm: zatm: fix memcmp casting (bsc#1105355).\n- audit: Fix extended comparison of GID/EGID (bsc#1051510).\n- audit: allow not equal op for audit by executable (bsc#1051510).\n- audit: fix use-after-free in audit_add_watch (bsc#1051510).\n- autofs: fix autofs_sbi() does not check super block type (git-fixes).\n- autofs: fix slab out of bounds read in getname_kernel() (git-fixes).\n- autofs: mount point create should honour passed in mode (git-fixes).\n- ax88179_178a: Check for supported Wake-on-LAN modes (bsc#1051510).\n- b43/leds: Ensure NUL-termination of LED name string (bsc#1051510).\n- b43legacy/leds: Ensure NUL-termination of LED name string (bsc#1051510).\n- badblocks: fix wrong return value in badblocks_set if badblocks are disabled (git-fixes).\n- batman-adv: Avoid probe ELP information leak (bsc#1051510).\n- batman-adv: Fix multicast TT issues with bogus ROAM flags (bsc#1051510).\n- batman-adv: Fix segfault when writing to sysfs elp_interval (bsc#1051510).\n- batman-adv: Fix segfault when writing to throughput_override (bsc#1051510).\n- batman-adv: Prevent duplicated gateway_node entry (bsc#1051510).\n- batman-adv: Prevent duplicated global TT entry (bsc#1051510).\n- batman-adv: Prevent duplicated nc_node entry (bsc#1051510).\n- batman-adv: Prevent duplicated softif_vlan entry (bsc#1051510).\n- batman-adv: Prevent duplicated tvlv handler (bsc#1051510).\n- batman-adv: fix backbone_gw refcount on queue_work() failure (bsc#1051510).\n- batman-adv: fix hardif_neigh refcount on queue_work() failure (bsc#1051510).\n- bcache: avoid unncessary cache prefetch bch_btree_node_get().\n- bcache: calculate the number of incremental GC nodes according to the total of btree nodes.\n- bcache: display rate debug parameters to 0 when writeback is not running.\n- bcache: do not check return value of debugfs_create_dir().\n- bcache: finish incremental GC.\n- bcache: fix I/O significant decline while backend devices registering.\n- bcache: fix error setting writeback_rate through sysfs interface.\n- bcache: free heap cache_set->flush_btree in bch_journal_free.\n- bcache: make the pr_err statement used for ENOENT only in sysfs_attatch section.\n- bcache: release dc->writeback_lock properly in bch_writeback_thread().\n- bcache: set max writeback rate when I/O request is idle.\n- bcache: simplify the calculation of the total amount of flash dirty data.\n- bdi: Fix another oops in wb_workfn() (bsc#1112746).\n- bdi: Preserve kabi when adding cgwb_release_mutex (bsc#1112746).\n- be2net: Fix memory leak in be_cmd_get_profile_config() (bsc#1086288).\n- be2net: remove unused old AIC info (bsc#1086288).\n- be2net: remove unused old custom busy-poll fields (bsc#1086288 ).\n- binfmt_elf: Respect error return from `regset->active' (bsc#1051510).\n- blk-mq: I/O and timer unplugs are inverted in blktrace (bsc#1112713).\n- blk-mq: avoid to synchronize rcu inside blk_cleanup_queue() (bsc#1077989).\n- blkdev: __blkdev_direct_IO_simple: fix leak in error case (bsc#1083663).\n- blkdev_report_zones_ioctl(): Use vmalloc() to allocate large buffers (bsc#1111819).\n- block, bfq: fix wrong init of saved start time for weight raising (bsc#1112708).\n- block, bfq: return nbytes and not zero from struct cftype .write() method (bsc#1106238).\n- block, dax: remove dead code in blkdev_writepages() (bsc#1104888).\n- block: Invalidate cache on discard v2 (bsc#1109992).\n- block: bfq: swap puts in bfqg_and_blkg_put (bsc#1112712).\n- block: bio_iov_iter_get_pages: fix size of last iovec (bsc#1083663).\n- block: bio_iov_iter_get_pages: pin more pages for multi-segment IOs (bsc#1083663).\n- block: bvec_nr_vecs() returns value for wrong slab (bsc#1111834).\n- block: do not print a message when the device went away (bsc#1098459).\n- block: do not warn for flush on read-only device (bsc#1107756).\n- block: fix warning when I/O elevator is changed as request_queue is being removed (bsc#1109979).\n- block: pass inclusive 'lend' parameter to truncate_inode_pages_range (bsc#1109992).\n- block: properly protect the 'queue' kobj in blk_unregister_queue (bsc#1109979).\n- bnx2x: Fix invalid memory access in rss hash config path (bsc#1050319).\n- bnx2x: Fix receiving tx-timeout in error or recovery state (bsc#1050319).\n- bnxt_en: Clean up unused functions (bsc#1086282).\n- bnxt_en: Do not adjust max_cp_rings by the ones used by RDMA (bsc#1086282).\n- bnxt_en: Fix VF mac address regression (bsc#1086282 ).\n- bnxt_re: Fix couple of memory leaks that could lead to IOMMU call traces (bsc#1050244).\n- bonding: avoid lockdep confusion in bond_get_stats() (netfilter-stable-18_08_04).\n- bpf, s390: fix potential memleak when later bpf_jit_prog fails (bsc#1083647).\n- bpf/verifier: disallow pointer subtraction (bsc#1083647).\n- bpf: fix references to free_bpf_prog_info() in comments (bsc#1083647).\n- bpf: fix uninitialized variable in bpf tools (bsc#1083647).\n- bpf: hash map: decrement counter on error (bsc#1083647).\n- bpf: make cavium thunder compatible w/ bpf_xdp_adjust_tail (bsc#1110096).\n- bpf: powerpc64: pad function address loads with NOPs (bsc#1083647).\n- bpf: use GFP_ATOMIC instead of GFP_KERNEL in bpf_parse_prog() (bsc#1083647).\n- brcmfmac: stop watchdog before detach and free everything (bsc#1051510).\n- brcmsmac: fix wrap around in conversion from constant to s16 (bsc#1051510).\n- btrfs: Add checker for EXTENT_CSUM (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: Add sanity check for EXTENT_DATA when reading out leaf (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: Check if item pointer overlaps with the item itself (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: Check that each block group has corresponding chunk at mount time (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667).\n- btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).\n- btrfs: Fix use-after-free when cleaning up fs_devs with a single stale device (bsc#1097105).\n- btrfs: Fix wrong btrfs_delalloc_release_extents parameter (bsc#1031392).\n- btrfs: Handle error from btrfs_uuid_tree_rem call in _btrfs_ioctl_set_received_subvol (bsc#1097105).\n- btrfs: Introduce mount time chunk dev extent mapping check (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: Manually implement device_total_bytes getter/setter (bsc#1043912).\n- btrfs: Move leaf and node validation checker to tree-checker.c (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: Remove unused parameters from various functions (bsc#1110649).\n- btrfs: Round down values which are written for total_bytes_size (bsc#1043912).\n- btrfs: Verify that every chunk has corresponding block group at mount time (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: add a comp_refs() helper (dependency for bsc#1031392).\n- btrfs: add tracepoints for outstanding extents mods (dependency for bsc#1031392).\n- btrfs: check-integrity: Fix NULL pointer dereference for degraded mount (bsc#1107947).\n- btrfs: cleanup extent locking sequence (dependency for bsc#1031392).\n- btrfs: delayed-inode: Remove wrong qgroup meta reservation calls (bsc#1031392).\n- btrfs: delayed-inode: Use new qgroup meta rsv for delayed inode and item (bsc#1031392).\n- btrfs: fix error handling in btrfs_dev_replace_start (bsc#1107535).\n- btrfs: fix missing error return in btrfs_drop_snapshot (Git-fixes bsc#1109919).\n- btrfs: handle errors while updating refcounts in update_ref_for_cow (Git-fixes bsc#1109915).\n- btrfs: log csums for all modified extents (bsc#1110639).\n- btrfs: make the delalloc block rsv per inode (dependency for bsc#1031392).\n- btrfs: qgroup: Add quick exit for non-fs extents (dependency for bsc#1031392).\n- btrfs: qgroup: Cleanup btrfs_qgroup_prepare_account_extents function (dependency for bsc#1031392).\n- btrfs: qgroup: Cleanup the remaining old reservation counters (bsc#1031392).\n- btrfs: qgroup: Commit transaction in advance to reduce early EDQUOT (bsc#1031392).\n- btrfs: qgroup: Do not use root->qgroup_meta_rsv for qgroup (bsc#1031392).\n- btrfs: qgroup: Fix qgroup reserved space underflow by only freeing reserved ranges (dependency for bsc#1031392).\n- btrfs: qgroup: Fix qgroup reserved space underflow caused by buffered write and quotas being enabled (dependency for bsc#1031392).\n- btrfs: qgroup: Fix wrong qgroup reservation update for relationship modification (bsc#1031392).\n- btrfs: qgroup: Introduce extent changeset for qgroup reserve functions (dependency for bsc#1031392).\n- btrfs: qgroup: Introduce function to convert META_PREALLOC into META_PERTRANS (bsc#1031392).\n- btrfs: qgroup: Introduce helpers to update and access new qgroup rsv (bsc#1031392).\n- btrfs: qgroup: Make qgroup_reserve and its callers to use separate reservation type (bsc#1031392).\n- btrfs: qgroup: Return actually freed bytes for qgroup release or free data (dependency for bsc#1031392).\n- btrfs: qgroup: Skeleton to support separate qgroup reservation type (bsc#1031392).\n- btrfs: qgroup: Split meta rsv type into meta_prealloc and meta_pertrans (bsc#1031392).\n- btrfs: qgroup: Update trace events for metadata reservation (bsc#1031392).\n- btrfs: qgroup: Update trace events to use new separate rsv types (bsc#1031392).\n- btrfs: qgroup: Use independent and accurate per inode qgroup rsv (bsc#1031392).\n- btrfs: qgroup: Use root::qgroup_meta_rsv_* to record qgroup meta reserved space (bsc#1031392).\n- btrfs: qgroup: Use separate meta reservation type for delalloc (bsc#1031392).\n- btrfs: remove type argument from comp_tree_refs (dependency for bsc#1031392).\n- btrfs: round down size diff when shrinking/growing device (bsc#1097105).\n- btrfs: scrub: Do not use inode page cache in scrub_handle_errored_block() (follow up for bsc#1108096).\n- btrfs: scrub: Do not use inode pages for device replace (follow up for bsc#1108096).\n- btrfs: switch args for comp_*_refs (dependency for bsc#1031392).\n- btrfs: tests/qgroup: Fix wrong tree backref level (bsc#1107928).\n- btrfs: tree-checker: Add checker for dir item (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: tree-checker: Detect invalid and empty essential trees (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: tree-checker: Enhance btrfs_check_node output (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: tree-checker: Enhance output for btrfs_check_leaf (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: tree-checker: Enhance output for check_csum_item (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: tree-checker: Enhance output for check_extent_data_item (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: tree-checker: Fix false panic for sanity test (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: tree-checker: Replace root parameter with fs_info (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: tree-checker: Verify block_group_item (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: tree-checker: use %zu format string for size_t (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- btrfs: tree-checker: use %zu format string for size_t (bsc#1102882, bsc#1102896, bsc#1102879, bsc#1102877, bsc#1102875,).\n- cdc-acm: fix race between reset and control messaging (bsc#1051510).\n- cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status (bsc#1051510).\n- ceph: avoid a use-after-free in ceph_destroy_options() (bsc#1111983).\n- ceph: fix incorrect use of strncpy (bsc#1107319).\n- ceph: return errors from posix_acl_equiv_mode() correctly (bsc#1107320).\n- cfg80211: fix a type issue in ieee80211_chandef_to_operating_class() (bsc#1051510).\n- cfg80211: nl80211_update_ft_ies() to validate NL80211_ATTR_IE (bsc#1051510).\n- cfg80211: reg: Init wiphy_idx in regulatory_hint_core() (bsc#1051510).\n- cgroup: avoid copying strings longer than the buffers (bsc#1051510).\n- cifs: Fix stack out-of-bounds in smb{2,3}_create_lease_buf() (bsc#1051510).\n- cifs: Fix use after free of a mid_q_entry (bsc#1112903).\n- cifs: check kmalloc before use (bsc#1051510).\n- cifs: fix memory leak in SMB2_open() (bsc#1112894).\n- cifs: integer overflow in in SMB2_ioctl() (bsc#1051510).\n- cifs: store the leaseKey in the fid on SMB2_open (bsc#1051510).\n- clk: clk-fixed-factor: Clear OF_POPULATED flag in case of failure (bsc#1051510).\n- clk: core: Potentially free connection id (bsc#1051510).\n- clk: imx6ul: fix missing of_node_put() (bsc#1051510).\n- clk: meson: gxbb: remove HHI_GEN_CLK_CTNL duplicate definition (bsc#1051510).\n- clk: mvebu: armada-38x: add support for 1866MHz variants (bsc#1105355).\n- clk: mvebu: armada-38x: add support for missing clocks (bsc#1105355).\n- clk: rockchip: Add pclk_rkpwm_pmu to PMU critical clocks in rk3399 (bsc#1051510).\n- clk: rockchip: fix clk_i2sout parent selection bits on rk3399 (bsc#1051510).\n- clk: tegra: bpmp: Do not crash when a clock fails to register (bsc#1051510).\n- clk: x86: Stop marking clocks as CLK_IS_CRITICAL (bsc#1051510).\n- clk: x86: add 'ether_clk' alias for Bay Trail / Cherry Trail (bsc#1051510).\n- clocksource/drivers/ti-32k: Add CLOCK_SOURCE_SUSPEND_NONSTOP flag for non-am43 SoCs (bsc#1051510).\n- clocksource/drivers/timer-atmel-pit: Properly handle error cases (bsc#1051510).\n- cls_matchall: fix tcf_unbind_filter missing (networking-stable-18_08_21).\n- coda: fix 'kernel memory exposure attempt' in fsync (bsc#1051510).\n- coresight: Handle errors in finding input/output ports (bsc#1051510).\n- coresight: tpiu: Fix disabling timeouts (bsc#1051510).\n- cpu/hotplug: Fix SMT supported evaluation (bsc#1110006).\n- cpufreq / CPPC: Set platform specific transition_delay_us (bsc#1101480).\n- cpufreq, intel_pstate: Allow unspecified FADT profile to probe PPC (bsc#1108841).\n- cpufreq: CPPC: Do not set transition_latency (bsc#1101480).\n- cpufreq: CPPC: Use transition_delay_us depending transition_latency (bsc#1101480).\n- cpufreq: remove setting of policy->cpu in policy->cpus during init (bsc#1101480).\n- crypto: ablkcipher - fix crash flushing dcache in error path (bsc#1051510).\n- crypto: blkcipher - fix crash flushing dcache in error path (bsc#1051510).\n- crypto: caam - fix implicit casts in endianness helpers (bsc#1051510).\n- crypto: caam/jr - fix ablkcipher_edesc pointer arithmetic (bsc#1051510).\n- crypto: caam/jr - fix descriptor DMA unmapping (bsc#1051510).\n- crypto: caam/qi - fix error path in xts setkey (bsc#1051510).\n- crypto: cavium/nitrox - fix for command corruption in queue full case with backlog submissions (bsc#1051510).\n- crypto: ccp - Check for NULL PSP pointer at module unload (bsc#1051510).\n- crypto: ccp - Fix command completion detection race (bsc#1051510).\n- crypto: ccp - add timeout support in the SEV command (bsc#1106838).\n- crypto: chelsio - Fix memory corruption in DMA Mapped buffers (bsc#1051510).\n- crypto: clarify licensing of OpenSSL asm code ().\n- crypto: lrw - Fix out-of bounds access on counter overflow (bsc#1051510).\n- crypto: mxs-dcp - Fix wait logic on chan threads (bsc#1051510).\n- crypto: qat - Fix KASAN stack-out-of-bounds bug in adf_probe() (bsc#1051510).\n- crypto: sharah - Unregister correct algorithms for SAHARA 3 (bsc#1051510).\n- crypto: skcipher - Fix -Wstringop-truncation warnings (bsc#1051510).\n- crypto: skcipher - fix aligning block size in skcipher_copy_iv() (bsc#1051510).\n- crypto: skcipher - fix crash flushing dcache in error path (bsc#1051510).\n- crypto: tcrypt - fix ghash-generic speed test (bsc#1051510).\n- crypto: vmac - require a block cipher with 128-bit block size (bsc#1051510).\n- crypto: vmac - separate tfm and request context (bsc#1051510).\n- crypto: vmx - Fix sleep-in-atomic bugs (bsc#1051510).\n- crypto: vmx - Use skcipher for ctr fallback to SLE12-SP4 (bsc#1106464).\n- crypto: x86/sha256-mb - fix digest copy in sha256_mb_mgr_get_comp_job_avx2() (bsc#1051510).\n- cxgb4: Fix the condition to check if the card is T5 (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: fix abort_req_rss6 struct (bsc#1046540).\n- cxgb4: when disabling dcb set txq dcb priority to 0 (bsc#1046540 ).\n- cxl: Configure PSL to not use APC virtual machines (bsc#1055014, git-fixes).\n- cxl: Fix wrong comparison in cxl_adapter_context_get() (bsc#1055014, git-fixes).\n- dax: Fix deadlock in dax_lock_mapping_entry() (bsc#1109951).\n- dax: Introduce a ->copy_to_iter dax operation (bsc#1098782).\n- dax: Make extension of dax_operations transparent (bsc#1098782).\n- dax: Report bytes remaining in dax_iomap_actor() (bsc#1098782).\n- dax: remove VM_MIXEDMAP for fsdax and device dax (bsc#1106007).\n- dax: remove default copy_from_iter fallback (bsc#1098782). \n- dax: require 'struct page' by default for filesystem dax (bsc#1104888).\n- dax: store pfns in the radix (bsc#1104888).\n- dccp: fix undefined behavior with 'cwnd' shift in ccid2_cwnd_restart() (netfilter-stable-18_08_17).\n- debugobjects: Make stack check warning more informative (bsc#1051510).\n- declance: Fix continuation with the adapter identification message (bsc#1051510).\n- device-dax: Add missing address_space_operations (bsc#1107783).\n- device-dax: Enable page_mapping() (bsc#1107783).\n- device-dax: Set page->index (bsc#1107783).\n- devicectree: bindings: fix location of leds common file (bsc#1051510).\n- dma-buf: remove redundant initialization of sg_table (bsc#1051510).\n- dmaengine: hsu: Support dmaengine_terminate_sync() (bsc#1051510).\n- dmaengine: idma64: Support dmaengine_terminate_sync() (bsc#1051510).\n- dmaengine: mv_xor_v2: kill the tasklets upon exit (bsc#1051510).\n- dmaengine: pl330: fix irq race with terminate_all (bsc#1051510).\n- do d_instantiate/unlock_new_inode combinations safely (git-fixes).\n- doc/README.SUSE: Remove mentions of cloneconfig (bsc#1103636).\n- driver core: add __printf verification to __ata_ehi_pushv_desc (bsc#1051510).\n- drivers/base: stop new probing during shutdown (bsc#1051510).\n- drivers/tty: add error handling for pcmcia_loop_config (bsc#1051510).\n- drm/amd/pp/Polaris12: Fix a chunk of registers missed to program (bsc#1051510).\n- drm/amdgpu/powerplay: fix missing break in switch statements (bsc#1113722)\n- drm/amdgpu: Enable/disable gfx PG feature in rlc safe mode (bsc#1051510).\n- drm/amdgpu: Fix RLC safe mode test in gfx_v9_0_enter_rlc_safe_mode (bsc#1051510).\n- drm/amdgpu: Fix SDMA HQD destroy error on gfx_v7 (bsc#1051510).\n- drm/amdgpu: Fix vce work queue was not cancelled when suspend (bsc#1106110)\n- drm/amdgpu: Pulling old prepare and submit for flip back (bsc#1051510).\n- drm/amdgpu: Update power state at the end of smu hw_init (bsc#1051510).\n- drm/amdgpu: add another ATPX quirk for TOPAZ (bsc#1051510).\n- drm/amdgpu: add new polaris pci id (bsc#1051510).\n- drm/amdgpu: fix error handling in amdgpu_cs_user_fence_chunk (bsc#1106110)\n- drm/amdgpu: fix swapped emit_ib_size in vce3 (bsc#1051510).\n- drm/amdgpu: revert 'fix deadlock of reservation between cs and gpu reset v2' (bsc#1051510).\n- drm/amdgpu: update tmr mc address (bsc#1100132).\n- drm/amdgpu:add new firmware id for VCN (bsc#1051510).\n- drm/amdgpu:add tmr mc address into amdgpu_firmware_info (bsc#1051510).\n- drm/amdkfd: Fix error codes in kfd_get_process (bsc#1051510).\n- drm/arm/malidp: Preserve LAYER_FORMAT contents when setting format (bsc#1051510).\n- drm/armada: fix colorkey mode property (bsc#1051510).\n- drm/armada: fix irq handling (bsc#1051510).\n- drm/bridge/sii8620: Fix display of packed pixel modes (bsc#1051510).\n- drm/bridge/sii8620: fix display of packed pixel modes in MHL2 (bsc#1051510).\n- drm/bridge/sii8620: fix loops in EDID fetch logic (bsc#1051510).\n- drm/bridge: adv7511: Reset registers on hotplug (bsc#1051510).\n- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo B50-80 (bsc#1051510).\n- drm/edid: VSDB yCBCr420 Deep Color mode bit definitions (bsc#1051510).\n- drm/exynos: decon5433: Fix WINCONx reset value (bsc#1051510).\n- drm/exynos: decon5433: Fix per-plane global alpha for XRGB modes (bsc#1051510).\n- drm/exynos: gsc: Fix support for NV16/61, YUV420/YVU420 and YUV422 modes (bsc#1051510).\n- drm/fb-helper: Fix typo on kerneldoc (bsc#1051510).\n- drm/hisilicon: hibmc: Do not carry error code in HiBMC framebuffer (bsc#1113722)\n- drm/hisilicon: hibmc: Do not overwrite fb helper surface depth (bsc#1113722)\n- drm/i915/aml: Introducing Amber Lake platform ().\n- drm/i915/audio: Fix audio enumeration issue on BXT ().\n- drm/i915/audio: Hook up component bindings even if displays are (bsc#1113722)\n- drm/i915/cfl: Add a new CFL PCI ID ().\n- drm/i915/dp: Link train Fallback on eDP only if fallback link BW can fit panel's native mode (bsc#1051510).\n- drm/i915/gen9+: Fix initial readout for Y tiled framebuffers (bsc#1113722)\n- drm/i915/glk: Add Quirk for GLK NUC HDMI port issues (bsc#1051510).\n- drm/i915/gvt: Fix the incorrect length of child_device_config issue (bsc#1051510).\n- drm/i915/gvt: Off by one in intel_vgpu_write_fence() (bsc#1051510).\n- drm/i915/gvt: clear ggtt entries when destroy vgpu (bsc#1051510).\n- drm/i915/gvt: request srcu_read_lock before checking if one gfn is valid (bsc#1051510).\n- drm/i915/kvmgt: Fix potential Spectre v1 (bsc#1051510).\n- drm/i915/lpe: Mark LPE audio runtime pm as 'no callbacks' (bsc#1051510).\n- drm/i915/overlay: Allocate physical registers from stolen (bsc#1051510).\n- drm/i915/whl: Introducing Whiskey Lake platform ().\n- drm/i915: Handle incomplete Z_FINISH for compressed error states (bsc#1100132)\n- drm/i915: Increase LSPCON timeout (bsc#1051510).\n- drm/i915: Nuke the LVDS lid notifier (bsc#1051510).\n- drm/i915: Only show debug for state changes when banning (bsc#1051510).\n- drm/i915: Restore user forcewake domains across suspend (bsc#1100132).\n- drm/i915: Restore vblank interrupts earlier (bsc#1051510).\n- drm/i915: Unmask user interrupts writes into HWSP on snb/ivb/vlv/hsw (bsc#1051510).\n- drm/i915: set DP Main Stream Attribute for color range on DDI platforms (bsc#1051510).\n- drm/imx: imx-ldb: check if channel is enabled before printing warning (bsc#1051510).\n- drm/imx: imx-ldb: disable LDB on driver bind (bsc#1051510).\n- drm/mediatek: fix OF sibling-node lookup (bsc#1106110)\n- drm/modes: Introduce drm_mode_match() ().\n- drm/msm: fix OF child-node lookup (bsc#1106110)\n- drm/nouveau/TBDdevinit: do not fail when PMU/PRE_OS is missing from VBIOS (bsc#1051510).\n- drm/nouveau/debugfs: Wake up GPU before doing any reclocking (bsc#1051510).\n- drm/nouveau/disp: fix DP disable race (bsc#1051510).\n- drm/nouveau/drm/nouveau: Do not forget to cancel hpd_work on suspend/unload (bsc#1051510).\n- drm/nouveau/drm/nouveau: Fix bogus drm_kms_helper_poll_enable() placement (bsc#1051510).\n- drm/nouveau/drm/nouveau: Prevent handling ACPI HPD events too early (bsc#1051510).\n- drm/nouveau/drm/nouveau: Use pm_runtime_get_noresume() in connector_detect() (bsc#1051510).\n- drm/nouveau: Do not disable polling in fallback mode (bsc#1103356).\n- drm/nouveau: Fix deadlocks in nouveau_connector_detect() (bsc#1051510).\n- drm/nouveau: Fix runtime PM leak in drm_open() (bsc#1051510).\n- drm/nouveau: tegra: Detach from ARM DMA/IOMMU mapping (bsc#1051510).\n- drm/panel: type promotion bug in s6e8aa0_read_mtp_id() (bsc#1051510).\n- drm/rockchip: lvds: add missing of_node_put (bsc#1051510).\n- drm/sti: do not remove the drm_bridge that was never added (bsc#1100132)\n- drm/sun4i: Fix an ulong overflow in the dotclock driver (bsc#1106110)\n- drm/sun4i: Fix releasing node when enumerating enpoints (bsc#1051510).\n- drm/tegra: Check for malformed offsets and sizes in the 'submit' IOCTL (bsc#1106170).\n- drm/tegra: Fix comparison operator for buffer size (bsc#1100132).\n- drm/vc4: Fix the 'no scaling' case on multi-planar YUV formats (bsc#1051510).\n- drm/virtio: fix bounds check in virtio_gpu_cmd_get_capset() (bsc#1113722)\n- drm: Add DRM client cap for aspect-ratio ().\n- drm: Add and handle new aspect ratios in DRM layer ().\n- drm: Add aspect ratio parsing in DRM layer ().\n- drm: Expose modes with aspect ratio, only if requested ().\n- drm: Handle aspect ratio info in legacy modeset path ().\n- drm: mali-dp: Call drm_crtc_vblank_reset on device init (bsc#1051510).\n- drm: mali-dp: Enable Global SE interrupts mask for DP500 (bsc#1051510).\n- drm: udl: Destroy framebuffer only if it was initialized (bsc#1051510).\n- dwc2: gadget: Fix ISOC IN DDMA PID bitfield value calculation (bsc#1051510).\n- e1000: check on netif_running() before calling e1000_up() (bsc#1051510).\n- e1000: ensure to free old tx/rx rings in set_ringparam() (bsc#1051510).\n- eeprom: at24: change nvmem stride to 1 (bsc#1051510).\n- eeprom: at24: check at24_read/write arguments (bsc#1051510).\n- eeprom: at24: correctly set the size for at24mac402 (bsc#1051510).\n- efi: Avoid potential crashes, fix the 'struct efi_pci_io_protocol_32' definition for mixed mode (bsc#1110006).\n- enable CONFIG_SCSI_MQ_DEFAULT (bsc#1107207)\n- enable MLX5 in azure (bsc#1108260)\n- enic: do not call enic_change_mtu in enic_probe (bsc#1051510).\n- enic: handle mtu change for vf properly (bsc#1051510).\n- enic: initialize enic->rfs_h.lock in enic_probe (bsc#1051510).\n- errseq: Add to documentation tree (bsc#1107008).\n- errseq: Always report a writeback error once (bsc#1107008).\n- ethtool: Remove trailing semicolon for static inline (bsc#1051510).\n- ethtool: fix a privilege escalation bug (bsc#1076830).\n- evm: Do not deadlock if a crypto algorithm is unavailable (bsc#1051510).\n- ext2, dax: introduce ext2_dax_aops (bsc#1104888).\n- ext2, dax: set ext2_dax_aops for dax files (bsc#1112554).\n- ext2: auto disable dax instead of failing mount (bsc#1104888).\n- ext4, dax: add ext4_bmap to ext4_dax_aops (bsc#1104888).\n- ext4, dax: introduce ext4_dax_aops (bsc#1104888).\n- ext4, dax: set ext4_dax_aops for dax files (bsc#1104888).\n- ext4: auto disable dax instead of failing mount (bsc#1104888).\n- ext4: avoid arithemetic overflow that can trigger a BUG (bsc#1112736).\n- ext4: avoid divide by zero fault when deleting corrupted inline directories (bsc#1112735).\n- ext4: check for NUL characters in extended attribute's name (bsc#1112732).\n- ext4: check to make sure the rename(2)'s destination is not freed (bsc#1112734).\n- ext4: do not mark mmp buffer head dirty (bsc#1112743).\n- ext4: fix online resize's handling of a too-small final block group (bsc#1112739).\n- ext4: fix online resizing for bigalloc file systems with a 1k block size (bsc#1112740).\n- ext4: fix spectre gadget in ext4_mb_regular_allocator() (bsc#1112733).\n- ext4: recalucate superblock checksum after updating free blocks/inodes (bsc#1112738).\n- ext4: reset error code in ext4_find_entry in fallback (bsc#1112731).\n- ext4: show test_dummy_encryption mount option in /proc/mounts (bsc#1112741).\n- ext4: sysfs: print ext4_super_block fields as little-endian (bsc#1106229).\n- extcon: Release locking when sending the notification of connector state (bsc#1051510).\n- f2fs: remove unneeded memory footprint accounting (bsc#1106233).\n- f2fs: remove unneeded memory footprint accounting (bsc#1106297).\n- f2fs: validate before set/clear free nat bitmap (bsc#1106231).\n- f2fs: validate before set/clear free nat bitmap (bsc#1106297).\n- fat: fix memory allocation failure handling of match_strdup() (bsc#1051510).\n- fb: fix lost console when the user unplugs a USB adapter (bsc#1051510).\n- fbdev/omapfb: fix omapfb_memory_read infoleak (bsc#1051510).\n- fbdev/via: fix defined but not used warning (bsc#1051510).\n- fbdev: Distinguish between interlaced and progressive modes (bsc#1051510).\n- fbdev: omapfb: off by one in omapfb_register_client() (bsc#1051510).\n- filesystem-dax: Introduce dax_lock_mapping_entry() (bsc#1107783).\n- filesystem-dax: Set page->index (bsc#1107783).\n- firmware, DMI: Add function to look up a handle and return DIMM size (bsc#1099125).\n- firmware: raspberrypi: Register hwmon driver (bsc#1108468).\n- fix __legitimize_mnt()/mntput() race (bsc#1106297).\n- fix a page leak in vhost_scsi_iov_to_sgl() error recovery (bsc#1051510).\n- fix mntput/mntput race (bsc#1106297).\n- floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl (bsc#1051510).\n- fs, dax: prepare for dax-specific address_space_operations (bsc#1104888).\n- fs, dax: use page->mapping to warn if truncate collides with a busy page (bsc#1104888).\n- fs/9p/xattr.c: catch the error of p9_client_clunk when setting xattr failed (bsc#1051510).\n- fs/dcache.c: fix kmemcheck splat at take_dentry_name_snapshot() (git-fixes).\n- fs/proc/proc_sysctl.c: fix potential page fault while unregistering sysctl table (bsc#1106297).\n- fs/quota: Fix spectre gadget in do_quotactl (bsc#1112745).\n- fs: dcache: Avoid livelock between d_alloc_parallel and __d_add (git-fixes).\n- fs: dcache: Use READ_ONCE when accessing i_dir_seq (git-fixes).\n- fuse: Add missed unlock_page() to fuse_readpages_fill() (bsc#1106291).\n- fuse: Do not access pipe->buffers without pipe_lock() (bsc#1051510).\n- fuse: Fix oops at process_init_reply() (bsc#1106291).\n- fuse: fix double request_end() (bsc#1106291).\n- fuse: fix initial parallel dirops (bsc#1106291).\n- fuse: fix unlocked access to processing queue (bsc#1106291).\n- fuse: umount should wait for all requests (bsc#1106291).\n- gen_stats: Fix netlink stats dumping in the presence of padding (netfilter-stable-18_07_23).\n- genirq: Add handle_fasteoi_{level,edge}_irq flow handlers (bsc#1105378).\n- genirq: Export more irq_chip_*_parent() functions (bsc#1105378).\n- getname_kernel() needs to make sure that ->name != ->iname in long case (git-fixes).\n- getxattr: use correct xattr length (bsc#1106235).\n- getxattr: use correct xattr length (bsc#1106297).\n- gpio: Add gpio driver support for ThunderX and OCTEON-TX (bsc#1105378).\n- gpio: Fix crash due to registration race (bsc#1051510).\n- gpio: Fix wrong rounding in gpio-menz127 (bsc#1051510).\n- gpio: adp5588: Fix sleep-in-atomic-context bug (bsc#1051510).\n- gpio: mb86s70: Revert 'Return error if requesting an already assigned gpio' (bsc#1051510).\n- gpio: ml-ioh: Fix buffer underwrite on probe error path (bsc#1051510).\n- gpio: pxa: Fix potential NULL dereference (bsc#1051510).\n- gpio: tegra: Move driver registration to subsys_init level (bsc#1051510).\n- gpio: thunderx: fix error return code in thunderx_gpio_probe() (bsc#1105378).\n- gpio: thunderx: remove unused .map() hook from irq_domain_ops (bsc#1105378).\n- gpiolib-acpi: Register GpioInt ACPI event handlers from a late_initcall (bsc#1051510).\n- gpiolib-acpi: make sure we trigger edge events at least once on boot (bsc#1051510).\n- gpiolib: Free the last requested descriptor (bsc#1051510).\n- gpiolib: Mark gpio_suffixes array with __maybe_unused (bsc#1051510).\n- gpiolib: acpi: Switch to cansleep version of GPIO library call (bsc#1051510).\n- gpu: host1x: Check whether size of unpin isn't 0 (bsc#1051510).\n- gpu: ipu-v3: csi: pass back mbus_code_to_bus_cfg error codes (bsc#1051510).\n- gpu: ipu-v3: default to id 0 on missing OF alias (bsc#1051510).\n- hfs: prevent crash on exit from failed search (bsc#1051510).\n- hfsplus: do not return 0 when fill_super() failed (bsc#1051510).\n- hfsplus: stop workqueue when fill_super() failed (bsc#1051510).\n- hotplug/cpu: Add operation queuing function ().\n- hotplug/cpu: Conditionally acquire/release DRC index ().\n- hotplug/cpu: Provide CPU readd operation ().\n- hv: Synthetic typo correction (bsc#1107207).\n- hv: add SPDX license id to Kconfig (bsc#1107207).\n- hv: add SPDX license to trace (bsc#1107207).\n- hv: avoid crash in vmbus sysfs files (bsc#1108377).\n- hv_balloon: trace post_status (bsc#1107207).\n- hv_netvsc: Add NetVSP v6 and v6.1 into version negotiation (bsc#1107207).\n- hv_netvsc: Add handlers for ethtool get/set msg level (bsc#1107207).\n- hv_netvsc: Add per-cpu ethtool stats for netvsc (bsc#1107207).\n- hv_netvsc: Add range checking for rx packet offset and length (bsc#1107207).\n- hv_netvsc: Clean up extra parameter from rndis_filter_receive_data() (bsc#1107207).\n- hv_netvsc: Fix a deadlock by getting rtnl lock earlier in netvsc_probe() (bsc#1107207).\n- hv_netvsc: Fix the return status in RX path (bsc#1107207).\n- hv_netvsc: Fix the variable sizes in ipsecv2 and rsc offload (bsc#1107207).\n- hv_netvsc: Pass net_device parameter to revoke and teardown functions (bsc#1107207).\n- hv_netvsc: add trace points (bsc#1107207).\n- hv_netvsc: fix bogus ifalias on network device (bsc#1107207).\n- hv_netvsc: fix network namespace issues with VF support (bsc#1107207).\n- hv_netvsc: fix schedule in RCU context ().\n- hv_netvsc: fix schedule in RCU context (bsc#1107207).\n- hv_netvsc: fix vf serial matching with pci slot info (bsc#1107207).\n- hv_netvsc: ignore devices that are not PCI (bsc#1107207).\n- hv_netvsc: move VF to same namespace as netvsc device (bsc#1107207).\n- hv_netvsc: pair VF based on serial number (bsc#1107207).\n- hv_netvsc: pass netvsc_device to rndis halt (bsc#1107207).\n- hv_netvsc: propogate Hyper-V friendly name into interface alias (bsc#1107207).\n- hv_netvsc: select needed ucs2_string routine (bsc#1107207).\n- hv_netvsc: simplify receive side calling arguments (bsc#1107207).\n- hv_netvsc: typo in NDIS RSS parameters structure (bsc#1107207).\n- hv_vmbus: Correct the stale comments regarding cpu affinity (bsc#1107207).\n- hwmon: (adt7475) Make adt7475_read_word() return errors (bsc#1051510).\n- hwmon: (ina2xx) fix sysfs shunt resistor read access (bsc#1051510).\n- hwmon: (nct6775) Set weight source to zero correctly (bsc#1051510).\n- hwmon: Add support for RPi voltage sensor (bsc#1108468).\n- hwmon: rpi: add module alias to raspberrypi-hwmon (bsc#1108468).\n- hwrng: core - document the quality field (bsc#1051510).\n- hyper-v: use GFP_KERNEL for hv_context.hv_numa_map (bsc#1107207).\n- hypfs_kill_super(): deal with failed allocations (bsc#1051510).\n- i2c: core: ACPI: Properly set status byte to 0 for multi-byte writes (bsc#1051510).\n- i2c: davinci: Avoid zero value of CLKH (bsc#1051510).\n- i2c: i2c-scmi: fix for i2c_smbus_write_block_data (bsc#1051510).\n- i2c: i801: Add missing documentation entries for Braswell and Kaby Lake (bsc#1051510).\n- i2c: i801: Add support for Intel Cedar Fork (bsc#1051510).\n- i2c: i801: Add support for Intel Ice Lake (bsc#1051510).\n- i2c: i801: Allow ACPI AML access I/O ports not reserved for SMBus (bsc#1051510).\n- i2c: i801: Consolidate chipset names in documentation and Kconfig (bsc#1051510).\n- i2c: i801: fix DNV's SMBCTRL register offset (bsc#1051510).\n- i2c: imx: Fix race condition in dma read (bsc#1051510).\n- i2c: rcar: cleanup DMA for all kinds of failure (bsc#1051510).\n- i2c: uniphier-f: issue STOP only for last message or I2C_M_STOP (bsc#1051510).\n- i2c: uniphier: issue STOP only for last message or I2C_M_STOP (bsc#1051510).\n- i2c: xiic: Make the start and the byte count write atomic (bsc#1051510).\n- i2c: xlp9xx: Fix case where SSIF read transaction completes early (bsc#1105907).\n- i2c: xlp9xx: Fix issue seen when updating receive length (bsc#1105907).\n- i2c: xlp9xx: Make sure the transfer size is not more than I2C_SMBUS_BLOCK_SIZE (bsc#1105907).\n- i40e: fix condition of WARN_ONCE for stat strings (bsc#1107522).\n- ib_srpt: Fix a use-after-free in srpt_close_ch() (bsc#1046306 ).\n- ibmvnic: Include missing return code checks in reset function (bsc#1107966).\n- ieee802154: ca8210: fix uninitialised data read (bsc#1051510).\n- ieee802154: fix gcc-4.9 warnings (bsc#1051510).\n- ieee802154: mrf24j40: fix incorrect mask in mrf24j40_stop (bsc#1051510).\n- iio: 104-quad-8: Fix off-by-one error in register selection (bsc#1051510).\n- iio: ad9523: Fix displayed phase (bsc#1051510).\n- iio: ad9523: Fix return value for ad952x_store() (bsc#1051510).\n- iio: adc: at91: fix acking DRDY irq on simple conversions (bsc#1051510).\n- iio: adc: at91: fix wrong channel number in triggered buffer mode (bsc#1051510).\n- iio: adc: imx25-gcq: Fix leak of device_node in mx25_gcq_setup_cfgs() (bsc#1051510).\n- iio: adc: ina2xx: avoid kthread_stop() with stale task_struct (bsc#1051510).\n- iio: adc: sun4i-gpadc: select REGMAP_IRQ (bsc#1051510).\n- iio: sca3000: Fix an error handling path in 'sca3000_probe()' (bsc#1051510).\n- iio: sca3000: Fix missing return in switch (bsc#1051510).\n- ima: based on policy verify firmware signatures (pre-allocated buffer) (bsc#1051510).\n- include/rdma/opa_addr.h: Fix an endianness issue (bsc#1046306 ).\n- input: rohm_bu21023: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT) (bsc#1051510).\n- intel_th: Fix device removal logic (bsc#1051510).\n- intel_th: pci: Add Ice Lake PCH support (bsc#1051510).\n- iommu/amd: Add support for IOMMU XT mode ().\n- iommu/amd: Add support for higher 64-bit IOMMU Control Register ().\n- iommu/amd: Clear memory encryption mask from physical address (bsc#1106105).\n- iommu/amd: Finish TLB flush in amd_iommu_unmap() (bsc#1106105).\n- iommu/amd: Return devid as alias for ACPI HID devices (bsc#1106105).\n- iommu/amd: make sure TLB to be flushed before IOVA freed (bsc#1106105).\n- iommu/arm-smmu-v3: Do not free page table ops twice (bsc#1106237).\n- iommu/arm-smmu: Error out only if not enough context interrupts (bsc#1106237).\n- iommu/vt-d: Add definitions for PFSID (bsc#1106237).\n- iommu/vt-d: Fix a potential memory leak (bsc#1106105).\n- iommu/vt-d: Fix dev iotlb pfsid use (bsc#1106237).\n- iommu/vt-d: Fix scatterlist offset handling (bsc#1106237).\n- iommu/vt-d: Ratelimit each dmar fault printing (bsc#1106105).\n- ioremap: Update pgtable free interfaces with addr (bsc#1110006).\n- ip: hash fragments consistently (netfilter-stable-18_07_27).\n- ip: in cmsg IP(V6)_ORIGDSTADDR call pskb_may_pull (netfilter-stable-18_07_27).\n- ipc/shm: fix shmat() nil address after round-down when remapping (bsc#1090078).\n- ipmi/powernv: Fix error return code in ipmi_powernv_probe() (git-fixes).\n- ipmi: Fix some counter issues (bsc#1105907).\n- ipmi: Move BT capabilities detection to the detect call (bsc#1106779).\n- ipmi: Remove ACPI SPMI probing from the SSIF (I2C) driver (bsc#1105907).\n- ipmi:bt: Set the timeout before doing a capabilities check (bsc#1051510).\n- ipmi:ssif: Add support for multi-part transmit messages > 2 parts (bsc#1103308).\n- ipv4: Return EINVAL when ping_group_range sysctl does not map to user ns (netfilter-stable-18_07_23).\n- ipv4: fix use-after-free in ip_cmsg_recv_dstaddr() (git-fixes).\n- ipv4: remove BUG_ON() from fib_compute_spec_dst (netfilter-stable-18_08_01).\n- ipv6: fix useless rol32 call on hash (netfilter-stable-18_07_23).\n- ipv6: ila: select CONFIG_DST_CACHE (netfilter-stable-18_07_23).\n- ipv6: make DAD fail with enhanced DAD when nonce length differs (netfilter-stable-18_07_23).\n- ipv6: sr: fix passing wrong flags to crypto_alloc_shash() (networking-stable-18_07_19).\n- ipvlan: fix IFLA_MTU ignored on NEWLINK (networking-stable-18_07_19).\n- irq/core: Fix boot crash when the irqaffinity= boot parameter is passed on CPUMASK_OFFSTACK=y kernels(v1) (bsc#1051510).\n- irqchip/bcm7038-l1: Hide cpu offline callback when building for !SMP (bsc#1051510).\n- irqdomain: Add irq_domain_{push,pop}_irq() functions (bsc#1105378).\n- irqdomain: Check for NULL function pointer in irq_domain_free_irqs_hierarchy() (bsc#1105378).\n- irqdomain: Factor out code to add and remove items to and from the revmap (bsc#1105378).\n- irqdomain: Prevent potential NULL pointer dereference in irq_domain_push_irq() (bsc#1105378).\n- irqdomain: Update the comments of fwnode field of irq_domain structure (bsc#1051510).\n- isdn: Disable IIOCDBGVAR (bsc#1051510).\n- iw_cxgb4: remove duplicate memcpy() in c4iw_create_listen() (bsc#1046543).\n- iwlwifi: dbg: do not crash if the firmware crashes in the middle of a debug dump (bsc#1051510).\n- iwlwifi: mvm: Allow TKIP for AP mode (bsc#1051510).\n- iwlwifi: mvm: check for n_profiles validity in EWRD ACPI (bsc#1051510).\n- iwlwifi: mvm: clear HW_RESTART_REQUESTED when stopping the interface (bsc#1051510).\n- iwlwifi: mvm: open BA session only when sta is authorized (bsc#1051510).\n- iwlwifi: mvm: send BCAST management frames to the right station (bsc#1051510).\n- iwlwifi: pcie gen2: check iwl_pcie_gen2_set_tb() return value (bsc#1051510).\n- iwlwifi: pcie: do not access periphery registers when not available (bsc#1051510).\n- iwlwifi: pcie: gen2: build A-MSDU only for GSO (bsc#1051510).\n- ixgbe: Refactor queue disable logic to take completion time into account (bsc#1101557).\n- ixgbe: Reorder Tx/Rx shutdown to reduce time needed to stop device (bsc#1101557).\n- jbd2: fix use after free in jbd2_log_do_checkpoint() (bsc#1113257).\n- kABI: Hide get_msr_feature() in kvm_x86_ops (bsc#1106240).\n- kABI: protect eswitch.h include (kabi).\n- kABI: protect struct nf_conn (kabi).\n- kABI: protect struct vsock_sock (kabi).\n- kABI: reexport tcp_send_ack (kabi).\n- kABI: reexport vsock_pending_work (kabi).\n- kabi fix for check_disk_size_change() (bsc#1098459).\n- kabi protect enum mem_type (bsc#1099125).\n- kabi protect hnae_ae_ops (bsc#1107924).\n- kabi protect struct kvm_sync_regs (bsc#1106948).\n- kabi/severities: Whitelist libceph, rbd, and ceph (bsc#1096748).\n- kabi/severities: add qeth inter-module symbols to ignore list.\n- kabi/severities: ignore __xive_vm_h_* KVM internal symbols.\n- kabi/severities: ignore ppc64 realmode helpers. KVM fixes remove exports of realmode_pfn_to_page iommu_tce_xchg_rm mm_iommu_lookup_rm mm_iommu_ua_to_hpa_rm. Some are no longer used and others are no longer exported because the code was consolideted in one place. These helpers are to be called in realmode and linking to them from non-KVM modules is a bug. Hence removing them does not break KABI.\n- kabi: move s390 mm_context_t lock to mm_struct and ignore the change (bsc#1103421).\n- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bsc#1105536).\n- kernfs: update comment about kernfs_path() return value (bsc#1051510).\n- kprobes/x86: Disable preemption in ftrace-based jprobes (bsc#1110006).\n- kprobes/x86: Fix %p uses in error messages (bsc#1110006).\n- kprobes/x86: Prohibit probing on exception masking instructions (bsc#1110006).\n- kprobes/x86: Release insn_slot in failure path (bsc#1110006).\n- ksm: fix unlocked iteration over vmas in cmp_and_merge_page() (VM Functionality bsc#1111806).\n- kvm, mm: account shadow page tables to kmemcg (bsc#1110006).\n- kvm/x86: kABI fix for vm_alloc/vm_free changes (bsc#1111506).\n- kvm: Make VM ioctl do valloc for some archs (bsc#1111506).\n- kvm: arm64: Convert kvm_set_s2pte_readonly() from inline asm to cmpxchg() (bsc#1108010).\n- kvm: nVMX: Fix fault vector for VMX operation at CPL > 0 (bsc#1106105).\n- kvm: nVMX: Use nested_run_pending rather than from_vmentry (bsc#1106240).\n- kvm: x86: Set highest physical address bits in non-present/reserved SPTEs (bsc#1106240).\n- kvm: x86: factor out kvm.arch.hyperv (de)init (bsc#1107207).\n- kvm: x86: fix KVM_XEN_HVM_CONFIG ioctl (bsc#1110006).\n- kvm: x86: hyperv: delete dead code in kvm_hv_hypercall() (bsc#1107207).\n- kvm: x86: hyperv: guest->host event signaling via eventfd (bsc#1107207).\n- kvm: x86: vmx: fix vpid leak (bsc#1106240).\n- kvmclock: fix TSC calibration for nested guests (bsc#1110006).\n- l2tp: use sk_dst_check() to avoid race on sk->sk_dst_cache (netfilter-stable-18_08_17).\n- lan78xx: Check for supported Wake-on-LAN modes (bsc#1051510).\n- lan78xx: Lan7801 Support for Fixed PHY (bsc#1085262).\n- lan78xx: Set ASD in MAC_CR when EEE is enabled (bsc#1085262).\n- lan78xx: remove redundant initialization of pointer 'phydev' (bsc#1085262).\n- leds: max8997: use mode when calling max8997_led_set_mode (bsc#1051510).\n- lib/bug.c: exclude non-BUG/WARN exceptions from report_bug() (bsc#1110006).\n- lib/iov_iter: Fix pipe handling in _copy_to_iter_mcsafe() (bsc#1098782).\n- lib/rhashtable: consider param->min_size when setting initial table size (bsc#1051510).\n- lib/test_hexdump.c: fix failure on big endian cpu (bsc#1051510).\n- lib/ubsan.c: s/missaligned/misaligned/ (bsc#1051510).\n- lib/ubsan: add type mismatch handler for new GCC/Clang (bsc#1051510).\n- lib/vsprintf: Remove atomic-unsafe support for %pCr (bsc#1051510).\n- libahci: Fix possible Spectre-v1 pmp indexing in ahci_led_store() (bsc#1051510).\n- libata: Fix command retry decision (bsc#1051510).\n- libata: Fix compile warning with ATA_DEBUG enabled (bsc#1051510).\n- libbpf: Makefile set specified permission mode (bsc#1083647).\n- libceph: check authorizer reply/challenge length before reading (bsc#1096748).\n- libceph: factor out __ceph_x_decrypt() (bsc#1096748).\n- libceph: factor out __prepare_write_connect() (bsc#1096748).\n- libceph: factor out encrypt_authorizer() (bsc#1096748).\n- libceph: store ceph_auth_handshake pointer in ceph_connection (bsc#1096748).\n- libceph: weaken sizeof check in ceph_x_verify_authorizer_reply() (bsc#1096748).\n- libertas: call into generic suspend code before turning off power (bsc#1051510).\n- libertas: fix suspend and resume for SDIO connected cards (bsc#1051510).\n- libnvdimm, btt: fix uninitialized err_lock (bsc#1103961).\n- libnvdimm, dimm: Maximize label transfer size (bsc#1111921, bsc#1113408, bsc#1113972).\n- libnvdimm, label: Fix sparse warning (bsc#1111921, bsc#1113408, bsc#1113972).\n- libnvdimm, label: change nvdimm_num_label_slots per UEFI 2.7 (bsc#1111921, bsc#1113408, bsc#1113972).\n- libnvdimm, nfit: enable support for volatile ranges (bsc#1103961).\n- libnvdimm, nfit: move the check on nd_reserved2 to the endpoint (bsc#1103961).\n- libnvdimm, pmem: Fix memcpy_mcsafe() return code handling in nsio_rw_bytes() (bsc#1098782).\n- libnvdimm, pmem: Restore page attributes when clearing errors (bsc#1107783).\n- libnvdimm: Use max contiguous area for namespace size (git-fixes).\n- libnvdimm: fix ars_status output length calculation (bsc#1104890).\n- libnvdimm: rename nd_sector_size_{show,store} to nd_size_select_{show,store} (bsc#1103961).\n- liquidio: fix hang when re-binding VF host drv after running DPDK VF driver (bsc#1067126).\n- liquidio: fix kernel panic in VF driver (bsc#1067126).\n- livepatch: Remove reliable stacktrace check in klp_try_switch_task() (bsc#1071995).\n- livepatch: Validate module/old func name length (bsc#1071995).\n- livepatch: create and include UAPI headers ().\n- llc: use refcount_inc_not_zero() for llc_sap_find() (netfilter-stable-18_08_17).\n- lockd: fix 'list_add double add' caused by legacy signal interface (git-fixes).\n- loop: add recursion validation to LOOP_CHANGE_FD (bsc#1112711).\n- loop: do not call into filesystem while holding lo_ctl_mutex (bsc#1112710).\n- loop: fix LOOP_GET_STATUS lock imbalance (bsc#1113284).\n- mac80211: Fix station bandwidth setting after channel switch (bsc#1051510).\n- mac80211: Run TXQ teardown code before de-registering interfaces (bsc#1051510).\n- mac80211: add stations tied to AP_VLANs during hw reconfig (bsc#1051510).\n- mac80211: always account for A-MSDU header changes (bsc#1051510).\n- mac80211: avoid kernel panic when building AMSDU from non-linear SKB (bsc#1051510).\n- mac80211: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bsc#1051510).\n- mac80211: do not Tx a deauth frame if the AP forbade Tx (bsc#1051510).\n- mac80211: do not convert to A-MSDU if frag/subframe limited (bsc#1051510).\n- mac80211: fix a race between restart and CSA flows (bsc#1051510).\n- mac80211: fix an off-by-one issue in A-MSDU max_subframe computation (bsc#1051510).\n- mac80211: fix pending queue hang due to TX_DROP (bsc#1051510).\n- mac80211: fix setting IEEE80211_KEY_FLAG_RX_MGMT for AP mode keys (bsc#1051510).\n- mac80211: mesh: fix HWMP sequence numbering to follow standard (bsc#1051510).\n- mac80211: minstrel: fix using short preamble CCK rates on HT clients (bsc#1051510).\n- mac80211: restrict delayed tailroom needed decrement (bsc#1051510).\n- mac80211: shorten the IBSS debug messages (bsc#1051510).\n- mac80211_hwsim: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bsc#1051510).\n- mac80211_hwsim: require at least one channel (bsc#1051510).\n- mach64: detect the dot clock divider correctly on sparc (bsc#1051510).\n- macros.kernel-source: pass -b properly in kernel module package (bsc#1107870).\n- mailbox: xgene-slimpro: Fix potential NULL pointer dereference (bsc#1051510).\n- make sure that __dentry_kill() always invalidates d_seq, unhashed or not (git-fixes).\n- md-cluster: clear another node's suspend_area after the copy is finished (bsc#1106333).\n- md-cluster: do not send msg if array is closing (bsc#1106333).\n- md-cluster: release RESYNC lock after the last resync message (bsc#1106688).\n- md-cluster: show array's status more accurate (bsc#1106333).\n- md/raid10: fix that replacement cannot complete recovery after reassemble (git-fixes).\n- md/raid1: add error handling of read error from FailFast device (git-fixes).\n- md/raid5-cache: disable reshape completely (git-fixes).\n- md/raid5: fix data corruption of replacements after originals dropped (git-fixes).\n- md: fix NULL dereference of mddev->pers in remove_and_add_spares() (git-fixes).\n- media: Revert '[media] tvp5150: fix pad format frame height' (bsc#1051510).\n- media: af9035: prevent buffer overflow on write (bsc#1051510).\n- media: cx231xx: fix potential sign-extension overflow on large shift (bsc#1051510).\n- media: davinci: vpif_display: Mix memory leak on probe error path (bsc#1051510).\n- media: dvb: fix compat ioctl translation (bsc#1051510).\n- media: em28xx: fix input name for Terratec AV 350 (bsc#1051510).\n- media: em28xx: use a default format if TRY_FMT fails (bsc#1051510).\n- media: exynos4-is: Prevent NULL pointer dereference in __isp_video_try_fmt() (bsc#1051510).\n- media: fsl-viu: fix error handling in viu_of_probe() (bsc#1051510).\n- media: helene: fix xtal frequency setting at power on (bsc#1051510).\n- media: mem2mem: Remove excessive try_run call (bsc#1051510).\n- media: omap3isp: zero-initialize the isp cam_xclk{a,b} initial data (bsc#1051510).\n- media: pci: cx23885: handle adding to list failure (bsc#1051510).\n- media: rtl28xxu: be sure that it won't go past the array size (bsc#1051510).\n- media: s3c-camif: ignore -ENOIOCTLCMD from v4l2_subdev_call for s_power (bsc#1051510).\n- media: s5p-mfc: Fix buffer look up in s5p_mfc_handle_frame_{new, copy_time} functions (bsc#1051510).\n- media: soc_camera: ov772x: correct setting of banding filter (bsc#1051510).\n- media: tm6000: add error handling for dvb_register_adapter (bsc#1051510).\n- media: tvp5150: avoid going past array on v4l2_querymenu() (bsc#1051510).\n- media: tvp5150: fix switch exit in set control handler (bsc#1051510).\n- media: tvp5150: fix width alignment during set_selection() (bsc#1051510).\n- media: tw686x: Fix oops on buffer alloc failure (bsc#1051510).\n- media: uvcvideo: Fix uvc_alloc_entity() allocation alignment (bsc#1051510).\n- media: v4l2-mem2mem: Fix missing v4l2_m2m_try_run call (bsc#1051510).\n- media: v4l2-tpg: fix kernel oops when enabling HFLIP and OSD (bsc#1051510).\n- media: videobuf-dma-sg: Fix dma_{sync,unmap}_sg() calls (bsc#1051510).\n- media: videobuf2-core: check for q->error in vb2_core_qbuf() (bsc#1051510).\n- media: vsp1: Fix YCbCr planar formats pitch calculation (bsc#1051510).\n- mei: bus: type promotion bug in mei_nfc_if_version() (bsc#1051510).\n- mei: do not update offset in write (bsc#1051510).\n- mei: ignore not found client in the enumeration (bsc#1051510).\n- mei: me: enable asynchronous probing ().\n- memcg, thp: do not invoke oom killer on thp charges (bsc#1089663).\n- memory: tegra: Apply interrupts mask per SoC (bsc#1051510).\n- memory: tegra: Do not handle spurious interrupts (bsc#1051510).\n- merge hyperv part of f5caf621\n- mfd: 88pm860x-i2c: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT) (bsc#1051510).\n- mfd: arizona: Correct calling of runtime_put_sync (bsc#1051510).\n- mfd: arizona: Do not use regmap_read_poll_timeout (bsc#1051510).\n- mfd: intel-lpss: Add Ice Lake PCI IDs (bsc#1051510).\n- mfd: lpc_ich: Do not touch SPI-NOR write protection bit on Apollo Lake (bsc#1051510).\n- mfd: sm501: Set coherent_dma_mask when creating subdevices (bsc#1051510).\n- mfd: ti_am335x_tscadc: Fix struct clk memory leak (bsc#1051510).\n- mlxsw: core_acl_flex_actions: Return error for conflicting actions (netfilter-stable-18_08_17).\n- mm, dax: introduce pfn_t_special() (bsc#1104888).\n- mm, madvise_inject_error: Disable MADV_SOFT_OFFLINE for ZONE_DEVICE pages (bsc#1107783).\n- mm, madvise_inject_error: Let memory_failure() optionally take a page reference (bsc#1107783).\n- mm, memory_failure: Collect mapping size in collect_procs() (bsc#1107783).\n- mm, memory_failure: Teach memory_failure() about dev_pagemap pages (bsc#1107783).\n- mm, numa: Migrate pages to local nodes quicker early in the lifetime of a task (bsc#1101669 optimise numa balancing for fast migrate).\n- mm, numa: Remove rate-limiting of automatic numa balancing migration (bsc#1101669 optimise numa balancing for fast migrate).\n- mm, numa: Remove rate-limiting of automatic numa balancing migration kabi (bsc#1101669 optimise numa balancing for fast migrate).\n- mm, page_alloc: double zone's batchsize (bsc#971975 VM performance -- page allocator).\n- mm/huge_memory.c: fix data loss when splitting a file pmd (bsc#1107074).\n- mm/hugetlb: filter out hugetlb pages if HUGEPAGE migration is not supported (bsc#1106697).\n- mm/migrate: Use spin_trylock() while resetting rate limit ().\n- mm/vmalloc: add interfaces to free unmapped page table (bsc#1110006).\n- mm/vmscan: wake up flushers for legacy cgroups too (bsc#1107061).\n- mm: /proc/pid/pagemap: hide swap entries from unprivileged users (Git-fixes bsc#1109907).\n- mm: Preserve _PAGE_DEVMAP across mprotect() calls (bsc#1111028).\n- mm: fix BUG_ON() in vmf_insert_pfn_pud() from VM_MIXEDMAP removal (bsc#1111841).\n- mm: fix devmem_is_allowed() for sub-page System RAM intersections (bsc#1106800).\n- mm: memcg: fix use after free in mem_cgroup_iter() (bsc#1107065).\n- mmc: block: avoid multiblock reads for the last sector in SPI mode (bsc#1051510).\n- mmc: omap_hsmmc: fix wakeirq handling on removal (bsc#1051510).\n- mmc: sdhci-of-esdhc: set proper dma mask for ls104x chips (bsc#1051510).\n- mmc: sdhci: do not try to use 3.3V signaling if not supported (bsc#1051510).\n- mmc: tegra: prevent HS200 on Tegra 3 (bsc#1051510).\n- modpost: ignore livepatch unresolved relocations ().\n- module: exclude SHN_UNDEF symbols from kallsyms api (bsc#1071995).\n- move a hyperv related patch to correct place in series.conf\n- move changes without Git-commit out of sorted section\n- mwifiex: handle race during mwifiex_usb_disconnect (bsc#1051510).\n- net/9p/client.c: version pointer uninitialized (bsc#1051510).\n- net/9p/trans_fd.c: fix race by holding the lock (bsc#1051510).\n- net/9p/trans_fd.c: fix race-condition by flushing workqueue before the kfree() (bsc#1051510).\n- net/9p: Switch to wait_event_killable() (bsc#1051510).\n- net/9p: fix error path of p9_virtio_probe (bsc#1051510).\n- net/ipv4: Set oif in fib_compute_spec_dst (netfilter-stable-18_07_23).\n- net/mlx5: E-Switch, Avoid setup attempt if not being e-switch manager (networking-stable-18_07_19).\n- net/mlx5e: Avoid dealing with vport representors if not being e-switch manager (networking-stable-18_07_19).\n- net/packet: fix use-after-free (networking-stable-18_07_19).\n- net: add support for Cavium PTP coprocessor (bsc#1110096).\n- net: bcmgenet: Fix sparse warnings in bcmgenet_put_tx_csum() (bsc#1051510).\n- net: bcmgenet: Fix unmapping of fragments in bcmgenet_xmit() (bsc#1051510).\n- net: bcmgenet: correct bad merge (bsc#1051510).\n- net: bcmgenet: enable loopback during UniMAC sw_reset (bsc#1051510).\n- net: bcmgenet: prevent duplicate calls of bcmgenet_dma_teardown (bsc#1051510).\n- net: cavium: fix NULL pointer dereference in cavium_ptp_put (bsc#1110096).\n- net: cavium: use module_pci_driver to simplify the code (bsc#1110096).\n- net: dccp: avoid crash in ccid3_hc_rx_send_feedback() (networking-stable-18_07_19).\n- net: dccp: switch rx_tstamp_last_feedback to monotonic clock (networking-stable-18_07_19).\n- net: diag: Do not double-free TCP_NEW_SYN_RECV sockets in tcp_abort (netfilter-stable-18_07_23).\n- net: dsa: Do not suspend/resume closed slave_dev (netfilter-stable-18_08_04).\n- net: ena: Eliminate duplicate barriers on weakly-ordered archs (bsc#1108093).\n- net: ena: Fix use of uninitialized DMA address bits field (netfilter-stable-18_08_01).\n- net: ena: fix device destruction to gracefully free resources (bsc#1108093).\n- net: ena: fix driver when PAGE_SIZE == 64kB (bsc#1108093).\n- net: ena: fix incorrect usage of memory barriers (bsc#1108093).\n- net: ena: fix missing calls to READ_ONCE (bsc#1108093).\n- net: ena: fix missing lock during device destruction (bsc#1108093).\n- net: ena: fix potential double ena_destroy_device() (bsc#1108093).\n- net: ena: fix surprise unplug NULL dereference kernel crash (bsc#1108093).\n- net: ethernet: mvneta: Fix napi structure mixup on armada 3700 (networking-stable-18_08_21).\n- net: fix amd-xgbe flow-control issue (netfilter-stable-18_08_01).\n- net: fix use-after-free in GRO with ESP (networking-stable-18_07_19).\n- net: hns3: Fix MSIX allocation issue for VF (bsc#1104353 ).\n- net: hns3: Fix comments for hclge_get_ring_chain_from_mbx (bsc#1104353).\n- net: hns3: Fix desc num set to default when setting channel (bsc#1104353).\n- net: hns3: Fix for command format parsing error in hclge_is_all_function_id_zero (bsc#1104353).\n- net: hns3: Fix for information of phydev lost problem when down/up (bsc#1104353).\n- net: hns3: Fix for l4 checksum offload bug (bsc#1104353 ).\n- net: hns3: Fix for mac pause not disable in pfc mode (bsc#1104353).\n- net: hns3: Fix for mailbox message truncated problem (bsc#1104353).\n- net: hns3: Fix for phy link issue when using marvell phy driver (bsc#1104353).\n- net: hns3: Fix for reset_level default assignment probelm (bsc#1104353).\n- net: hns3: Fix for using wrong mask and shift in hclge_get_ring_chain_from_mbx (bsc#1104353).\n- net: hns3: Fix for waterline not setting correctly (bsc#1104353).\n- net: hns3: Fix get_vector ops in hclgevf_main module (bsc#1104353).\n- net: hns3: Fix return value error in hns3_reset_notify_down_enet (bsc#1104353).\n- net: hns3: Fix warning bug when doing lp selftest (bsc#1104353 ).\n- net: hns3: Prevent sending command during global or core reset (bsc#1104353).\n- net: hns3: Standardize the handle of return value (bsc#1104353 ).\n- net: hns3: add unlikely for error check (bsc#1104353 ).\n- net: hns3: fix page_offset overflow when CONFIG_ARM64_64K_PAGES (bsc#1104353).\n- net: hns3: fix return value error while hclge_cmd_csq_clean failed (bsc#1104353).\n- net: hns3: modify hnae_ to hnae3_ (bsc#1104353).\n- net: hns3: remove some redundant assignments (bsc#1104353 ).\n- net: hns3: remove unnecessary ring configuration operation while resetting (bsc#1104353).\n- net: hns3: simplify hclge_cmd_csq_clean (bsc#1104353 ).\n- net: hns: add netif_carrier_off before change speed and duplex (bsc#1107924).\n- net: hns: add the code for cleaning pkt in chip (bsc#1107924).\n- net: mdio-mux: bcm-iproc: fix wrong getter and setter pair (netfilter-stable-18_08_01).\n- net: mvneta: fix mvneta_config_rss on armada 3700 (networking-stable-18_08_21).\n- net: mvneta: fix the Rx desc DMA address in the Rx path (networking-stable-18_07_19).\n- net: phy: consider PHY_IGNORE_INTERRUPT in phy_start_aneg_priv (netfilter-stable-18_07_27).\n- net: phy: fix flag masking in __set_phy_supported (netfilter-stable-18_07_23).\n- net: rtnl_configure_link: fix dev flags changes arg to __dev_notify_flags (git-fixes).\n- net: skb_segment() should not return NULL (netfilter-stable-18_07_27).\n- net: stmmac: Fix WoL for PCI-based setups (netfilter-stable-18_08_04).\n- net: stmmac: mark PM functions as __maybe_unused (git-fixes).\n- net: sungem: fix rx checksum support (networking-stable-18_07_19).\n- net: systemport: Fix CRC forwarding check for SYSTEMPORT Lite (netfilter-stable-18_07_23).\n- net: thunder: change q_len's type to handle max ring size (bsc#1110096).\n- net: thunderx: Set max queue count taking XDP_TX into account (bsc#1110096).\n- net: thunderx: add MAC address filter tracking for LMAC (bsc#1110096).\n- net: thunderx: add XCAST messages handlers for PF (bsc#1110096).\n- net: thunderx: add multicast filter management support (bsc#1110096).\n- net: thunderx: add ndo_set_rx_mode callback implementation for VF (bsc#1110096).\n- net: thunderx: add new messages for handle ndo_set_rx_mode callback (bsc#1110096).\n- net: thunderx: add timestamping support (bsc#1110096).\n- net: thunderx: add workqueue control structures for handle ndo_set_rx_mode request (bsc#1110096).\n- net: thunderx: check for failed allocation lmac->dmacs (bsc#1110096).\n- net: thunderx: fix double free error (bsc#1110096).\n- net: thunderx: move filter register related macro into proper place (bsc#1110096).\n- net: thunderx: prevent concurrent data re-writing by nicvf_set_rx_mode (bsc#1110096).\n- net: thunderx: remove a couple of redundant assignments (bsc#1110096).\n- net: thunderx: rework mac addresses list to u64 array (bsc#1110096).\n- net_sched: Fix missing res info when create new tc_index filter (netfilter-stable-18_08_17).\n- net_sched: blackhole: tell upper qdisc about dropped packets (networking-stable-18_07_19).\n- netfilter: do not set F_IFACE on ipv6 fib lookups (netfilter-stable-18_06_25).\n- netfilter: ip6t_rpfilter: provide input interface for route lookup (netfilter-stable-18_06_25).\n- netfilter: ip6t_rpfilter: set F_IFACE for linklocal addresses (git-fixes).\n- netfilter: nat: Revert 'netfilter: nat: convert nat bysrc hash to rhashtable' (netfilter-stable-17_11_16).\n- netfilter: nf_tables: add missing netlink attrs to policies (netfilter-stable-18_06_27).\n- netfilter: nf_tables: do not assume chain stats are set when jumplabel is set (netfilter-stable-18_06_27).\n- netfilter: nf_tables: fix memory leak on error exit return (netfilter-stable-18_06_27).\n- netfilter: nf_tables: nft_compat: fix refcount leak on xt module (netfilter-stable-18_06_27).\n- netfilter: nf_tables: use WARN_ON_ONCE instead of BUG_ON in nft_do_chain() (netfilter-stable-18_06_25).\n- netfilter: nft_compat: fix handling of large matchinfo size (netfilter-stable-18_06_27).\n- netfilter: nft_compat: prepare for indirect info storage (netfilter-stable-18_06_27).\n- netfilter: nft_meta: fix wrong value dereference in nft_meta_set_eval (netfilter-stable-18_06_27).\n- netlink: Do not shift on 64 for ngroups (git-fixes).\n- netlink: Do not shift with UB on nlk->ngroups (netfilter-stable-18_08_01).\n- netlink: Do not subscribe to non-existent groups (netfilter-stable-18_08_01).\n- netlink: Fix spectre v1 gadget in netlink_create() (netfilter-stable-18_08_04).\n- nfs/filelayout: fix oops when freeing filelayout segment (bsc#1105190).\n- nfs/pnfs: fix nfs_direct_req ref leak when i/o falls back to the mds (git-fixes).\n- nfs41: do not return ENOMEM on LAYOUTUNAVAILABLE (git-fixes).\n- nfsd: remove blocked locks on client teardown (git-fixes).\n- nl80211: Add a missing break in parse_station_flags (bsc#1051510).\n- nl80211: check nla_parse_nested() return values (bsc#1051510).\n- nvdimm: Clarify comment in sizeof_namespace_index (bsc#1111921, bsc#1113408, bsc#1113972).\n- nvdimm: Remove empty if statement (bsc#1111921, bsc#1113408, bsc#1113972).\n- nvdimm: Sanity check labeloff (bsc#1111921, bsc#1113408, bsc#1113972).\n- nvdimm: Split label init out from the logic for getting config data (bsc#1111921, bsc#1113408, bsc#1113972).\n- nvdimm: Use namespace index data to reduce number of label reads needed (bsc#1111921, bsc#1113408, bsc#1113972).\n- nvme: call nvme_complete_rq when nvmf_check_ready fails for mpath I/O (bsc#1107685).\n- nvme: register ns_id attributes as default sysfs groups (bsc#1105247).\n- nvme_fc: add 'nvme_discovery' sysfs attribute to fc transport device (bsc#1044189).\n- objtool, kprobes/x86: Sync the latest asm/insn.h header with tools/objtool/arch/x86/include/asm/insn.h (bsc#1110006).\n- of: add helper to lookup compatible child node (bsc#1106110)\n- orangefs: fix deadlock; do not write i_size in read_iter (bsc#1051510).\n- orangefs: initialize op on loop restart in orangefs_devreq_read (bsc#1051510).\n- orangefs: use list_for_each_entry_safe in purge_waiting_ops (bsc#1051510).\n- orangefs_kill_sb(): deal with allocation failures (bsc#1051510).\n- ovl: Sync upper dirty data when syncing overlayfs (git-fixes).\n- ovl: fix format of setxattr debug (git-fixes).\n- parport: sunbpp: fix error return code (bsc#1051510).\n- partitions/aix: append null character to print data from disk (bsc#1051510).\n- partitions/aix: fix usage of uninitialized lv_info and lvname structures (bsc#1051510).\n- perf/x86/amd/ibs: Do not access non-started event (bsc#1110006).\n- perf/x86/cstate: Fix possible Spectre-v1 indexing for pkg_msr (bsc#1110006).\n- perf/x86/intel/lbr: Fix incomplete LBR call stack (bsc#1110006).\n- perf/x86/intel/uncore: Correct fixed counter index check for NHM (bsc#1110006).\n- perf/x86/intel/uncore: Correct fixed counter index check in generic code (bsc#1110006).\n- perf/x86/intel/uncore: Fix Skylake UPI event format (bsc#1110006).\n- perf/x86/intel: Do not accidentally clear high bits in bdw_limit_period() (bsc#1110006).\n- perf/x86/intel: Fix event update for auto-reload (bsc#1110006).\n- perf/x86/intel: Fix large period handling on Broadwell CPUs (bsc#1110006).\n- perf/x86/intel: Fix linear IP of PEBS real_ip on Haswell and later CPUs (bsc#1110006).\n- perf/x86/intel: Properly save/restore the PMU state in the NMI handler (bsc#1110006).\n- perf/x86/msr: Fix possible Spectre-v1 indexing in the MSR driver (bsc#1110006).\n- perf/x86: Fix possible Spectre-v1 indexing for hw_perf_event cache_* (bsc#1110006).\n- perf/x86: Fix possible Spectre-v1 indexing for x86_pmu::event_map() (bsc#1110006).\n- pinctrl/amd: only handle irq if it is pending and unmasked (bsc#1051510).\n- pinctrl: cannonlake: Fix HOSTSW_OWN register offset of H variant (bsc#1051510).\n- pipe: actually allow root to exceed the pipe buffer limits (bsc#1106297).\n- pipe: match pipe_max_size data type with procfs (git-fixes).\n- platform/x86: alienware-wmi: Correct a memory leak (bsc#1051510).\n- platform/x86: asus-nb-wmi: Add keymap entry for lid flip action on UX360 (bsc#1051510).\n- platform/x86: thinkpad_acpi: Proper model/release matching (bsc#1051510).\n- platform/x86: toshiba_acpi: Fix defined but not used build warnings (bsc#1051510).\n- pmem: Switch to copy_to_iter_mcsafe() (bsc#1098782).\n- pnfs/blocklayout: off by one in bl_map_stripe() (git-fixes).\n- power: gemini-poweroff: Avoid more spurious poweroffs (bsc#1051510).\n- power: generic-adc-battery: check for duplicate properties copied from iio channels (bsc#1051510).\n- power: generic-adc-battery: fix out-of-bounds write when copying channel properties (bsc#1051510).\n- power: remove possible deadlock when unregistering power_supply (bsc#1051510).\n- power: supply: axp288_charger: Fix initial constant_charge_current value (bsc#1051510).\n- power: supply: max77693_charger: fix unintentional fall-through (bsc#1051510).\n- power: vexpress: fix corruption in notifier registration (bsc#1051510).\n- powernv/pseries: consolidate code for mce early handling (bsc#1094244).\n- powerpc/64s: Default l1d_size to 64K in RFI fallback flush (bsc#1068032, git-fixes).\n- powerpc/64s: Fix DT CPU features Power9 DD2.1 logic (bsc#1055117).\n- powerpc/64s: Fix compiler store ordering to SLB shadow area (bsc#1094244).\n- powerpc/64s: move machine check SLB flushing to mm/slb.c (bsc#1094244).\n- powerpc/fadump: cleanup crash memory ranges support (bsc#1103269).\n- powerpc/fadump: re-register firmware-assisted dump if already registered (bsc#1108170, bsc#1108823).\n- powerpc/firmware: Add definitions for new drc-info firmware feature (bsc#1109158).\n- powerpc/kprobes: Fix call trace due to incorrect preempt count (bsc#1065729).\n- powerpc/kvm/booke: Fix altivec related build break (bsc#1061840).\n- powerpc/kvm: Switch kvm pmd allocator to custom allocator (bsc#1061840).\n- powerpc/lib: Fix the feature fixup tests to actually work (bsc#1065729).\n- powerpc/mce: Fix SLB rebolting during MCE recovery path (bsc#1094244).\n- powerpc/mm/hugetlb: initialize the pagetable cache correctly for hugetlb (bsc#1091800).\n- powerpc/mm: Rename find_linux_pte_or_hugepte() (bsc#1061840).\n- powerpc/numa: Skip onlining a offline node in kdump path (bsc#1109784).\n- powerpc/numa: Use associativity if VPHN hcall is successful (bsc#1110363).\n- powerpc/perf: Fix IMC allocation routine (bsc#1054914).\n- powerpc/perf: Fix memory allocation for core-imc based on num_possible_cpus() (bsc#1054914).\n- powerpc/perf: Remove sched_task function defined for thread-imc (bsc#1054914).\n- powerpc/pkeys: Fix reading of ibm, processor-storage-keys property (bsc#1109244).\n- powerpc/powernv/ioda2: Reduce upper limit for DMA window size (bsc#1055120).\n- powerpc/powernv/ioda: Allocate indirect TCE levels on demand (bsc#1061840).\n- powerpc/powernv/ioda: Finish removing explicit max window size check (bsc#1061840).\n- powerpc/powernv/ioda: Remove explicit max window size check (bsc#1061840).\n- powerpc/powernv/npu: Do a PID GPU TLB flush when invalidating a large address range (bsc#1055120).\n- powerpc/powernv: Add indirect levels to it_userspace (bsc#1061840).\n- powerpc/powernv: Move TCE manupulation code to its own file (bsc#1061840).\n- powerpc/powernv: Rework TCE level allocation (bsc#1061840).\n- powerpc/pseries/mm: Introducing FW_FEATURE_BLOCK_REMOVE (bsc#1109158).\n- powerpc/pseries/mm: call H_BLOCK_REMOVE (bsc#1109158).\n- powerpc/pseries/mm: factorize PTE slot computation (bsc#1109158).\n- powerpc/pseries: Avoid using the size greater than RTAS_ERROR_LOG_MAX (bsc#1094244).\n- powerpc/pseries: Defer the logging of rtas error to irq work queue (bsc#1094244).\n- powerpc/pseries: Define MCE error event section (bsc#1094244).\n- powerpc/pseries: Disable CPU hotplug across migrations (bsc#1065729).\n- powerpc/pseries: Display machine check error details (bsc#1094244).\n- powerpc/pseries: Dump the SLB contents on SLB MCE errors (bsc#1094244).\n- powerpc/pseries: Fix 'OF: ERROR: Bad of_node_put() on /cpus' during DLPAR (bsc#1113295).\n- powerpc/pseries: Fix CONFIG_NUMA=n build (bsc#1067906, git-fixes).\n- powerpc/pseries: Fix build break for SPLPAR=n and CPU hotplug (bsc#1079524, git-fixes).\n- powerpc/pseries: Fix duplicate firmware feature for DRC_INFO (bsc#1109158).\n- powerpc/pseries: Fix endianness while restoring of r3 in MCE handler (bsc#1094244).\n- powerpc/pseries: Flush SLB contents on SLB MCE errors (bsc#1094244).\n- powerpc/pseries: Remove prrn_work workqueue (bsc#1102495, bsc#1109337).\n- powerpc/pseries: Remove unneeded uses of dlpar work queue (bsc#1102495, bsc#1109337).\n- powerpc/pseries: fix EEH recovery of some IOV devices (bsc#1078720, git-fixes).\n- powerpc/rtas: Fix a potential race between CPU-Offline Migration (bsc#1111870).\n- powerpc/tm: Avoid possible userspace r1 corruption on reclaim (bsc#1109333).\n- powerpc/tm: Fix userspace r13 corruption (bsc#1109333).\n- powerpc/topology: Get topology for shared processors at boot (bsc#1104683).\n- powerpc/xive: Fix trying to 'push' an already active pool VP (bsc#1085030, git-fixes).\n- powerpc/xive: Move definition of ESB bits (bsc#1061840).\n- powerpc/xmon: Add ISA v3.0 SPRs to SPR dump (bsc#1061840).\n- powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (bsc#1068032, bsc#1080157, git-fixes).\n- powerpc: Avoid code patching freed init sections (bsc#1107735).\n- powerpc: Fix size calculation using resource_size() (bsc#1012382).\n- powerpc: KABI add aux_ptr to hole in paca_struct to extend it with additional members (bsc#1094244).\n- powerpc: KABI: move mce_data_buf into paca_aux (bsc#1094244).\n- powerpc: make feature-fixup tests fortify-safe (bsc#1065729).\n- powerpc: pseries: remove dlpar_attach_node dependency on full path (bsc#1113295).\n- ppp: Destroy the mutex when cleanup (bsc#1051510).\n- ppp: fix __percpu annotation (bsc#1051510).\n- printk/tracing: Do not trace printk_nmi_enter() (bsc#1112208).\n- printk: drop in_nmi check from printk_safe_flush_on_panic() (bsc#1112170).\n- proc: restrict kernel stack dumps to root (git-fixes). blacklist.conf:\n- pstore: Fix incorrect persistent ram buffer mapping (bsc#1051510).\n- ptp: fix missing break in switch (bsc#1105355).\n- ptr_ring: fail early if queue occupies more than KMALLOC_MAX_SIZE (bsc#1105355).\n- ptr_ring: fix up after recent ptr_ring changes (bsc#1105355).\n- ptr_ring: prevent integer overflow when calculating size (bsc#1105355).\n- ptrace,x86: Make user_64bit_mode() available to 32-bit builds (bsc#1110006).\n- pwm: tiehrpwm: Fix disabling of output of PWMs (bsc#1051510).\n- qed: Add missing device config for RoCE EDPM in UFP mode (bsc#1109217).\n- qed: Avoid sending mailbox commands when MFW is not responsive (bsc#1050536).\n- qed: Do not add VLAN 0 tag to untagged frames in multi-function mode (bsc#1050536).\n- qed: Fix populating the invalid stag value in multi function mode (bsc#1050536).\n- qed: Fix shmem structure inconsistency between driver and the mfw (bsc#1110561).\n- qed: Prevent a possible deadlock during driver load and unload (bsc#1050536).\n- qed: Wait for MCP halt and resume commands to take place (bsc#1050536).\n- qed: Wait for ready indication before rereading the shmem (bsc#1050536).\n- qlcnic: fix Tx descriptor corruption on 82xx devices (bsc#1050540).\n- qlge: Fix netdev features configuration (bsc#1098822).\n- qmi_wwan: Added support for Gemalto's Cinterion ALASxx WWAN interface (bsc#1051510).\n- qmi_wwan: set DTR for modems in forced USB2 mode (bsc#1051510).\n- qrtr: add MODULE_ALIAS macro to smd (bsc#1051510).\n- r8152: Check for supported Wake-on-LAN Modes (bsc#1051510).\n- r8169: Clear RTL_FLAG_TASK_*_PENDING when clearing RTL_FLAG_TASK_ENABLED (bsc#1051510).\n- r8169: add support for NCube 8168 network card (bsc#1051510).\n- race of lockd inetaddr notifiers vs nlmsvc_rqst change (git-fixes).\n- random: add new ioctl RNDRESEEDCRNG (bsc#1051510).\n- random: fix possible sleeping allocation from irq context (bsc#1051510).\n- random: mix rdrand with entropy sent in from userspace (bsc#1051510).\n- random: rate limit unseeded randomness warnings (git-fixes).\n- random: set up the NUMA crng instances after the CRNG is fully initialized (bsc#1051510).\n- rculist: Improve documentation for list_for_each_entry_from_rcu() (bsc#1084760).\n- rculist: add list_for_each_entry_from_rcu() (bsc#1084760).\n- readahead: stricter check for bdi io_pages (VM Functionality, git fixes).\n- regulator: fix crash caused by null driver data (bsc#1051510).\n- reiserfs: add check to detect corrupted directory entry (bsc#1109818).\n- reiserfs: do not panic on bad directory entries (bsc#1109818).\n- reiserfs: fix broken xattr handling (heap corruption, bad retval) (bsc#1106236).\n- rename a hv patch to reduce conflicts in -AZURE\n- rename/renumber hv patches to simplify upcoming upstream merges Good Bye automerge. Hello Conflicts.\n- rename/renumber hv patches to simplify upcoming upstream merges No code changes.\n- reorder a qedi patch to allow further work in this branch\n- resort series.conf\n- resource: Include resource end in walk_*() interfaces (bsc#1114279).\n- rhashtable: add schedule points (bsc#1051510).\n- rndis_wlan: potential buffer overflow in rndis_wlan_auth_indication() (bsc#1051510).\n- root dentries need RCU-delayed freeing (bsc#1106297).\n- rpc_pipefs: fix double-dput() (bsc#1051510).\n- rpm/kernel-binary.spec.in: fix call of split-modules split-modules is called with some parameters depending on config options. But since we do not use backslash consistelny, the call to split-modules might be evaluated so that also the following cat command is appended. Avoid this behaviour by using backslashes everywhere and add %nil to the end. This perhaps never happens, but stay on the safe side.\n- rpm/mkspec: build dtbs for architectures marked -!needs_updating\n- rpm/mkspec: fix ppc64 kernel-source build.\n- rpmsg: Correct support for MODULE_DEVICE_TABLE() (git-fixes).\n- rsi: Fix 'invalid vdd' warning in mmc (bsc#1051510).\n- rtc: bq4802: add error handling for devm_ioremap (bsc#1051510).\n- rtnetlink: add rtnl_link_state check in rtnl_configure_link (netfilter-stable-18_07_27).\n- rxrpc: Fix user call ID check in rxrpc_service_prealloc_one (netfilter-stable-18_08_04).\n- s390/crypto: Fix return code checking in cbc_paes_crypt() (bsc#1108323, LTC#171709).\n- s390/entry.S: use assembler alternatives (bsc#1103421).\n- s390/lib: use expoline for all bcr instructions (git-fixes, bsc#1103421).\n- s390/mm: fix local TLB flushing vs. detach of an mm address space (bsc#1103421).\n- s390/mm: fix race on mm->context.flush_mm (bsc#1103421).\n- s390/pci: fix out of bounds access during irq setup (bsc#1108323, LTC#171068).\n- s390/qdio: reset old sbal_state flags (LTC#171525, bsc#1106948).\n- s390/qeth: consistently re-enable device features (bsc#1104482, LTC#170340).\n- s390/qeth: do not clobber buffer on async TX completion (bsc#1104482, LTC#170340).\n- s390/qeth: rely on kernel for feature recovery (bsc#1104482, LTC#170340).\n- s390/qeth: use vzalloc for QUERY OAT buffer (LTC#171527, bsc#1106948).\n- s390/runtime instrumentation: simplify task exit handling (bsc#1103421).\n- s390: Prevent hotplug rwsem recursion (bsc#1105731).\n- s390: always save and restore all registers on context switch (bsc#1103421).\n- s390: detect etoken facility (bsc#1103421).\n- s390: fix br_r1_trampoline for machines without exrl (git-fixes, bsc#1103421).\n- s390: fix compat system call table (bsc#1103421).\n- s390: fix handling of -1 in set{,fs}id16 syscalls (bsc#1103421).\n- s390: use expoline thunks for all branches generated by the BPF JIT (bsc#1103421).\n- samples/bpf: adjust rlimit RLIMIT_MEMLOCK for xdp1 (bsc#1083647).\n- sched/fair: Fix bandwidth timer clock drift condition (Git-fixes).\n- sched/fair: Fix vruntime_normalized() for remote non-migration wakeup (git-fixes).\n- sched/isolcpus: Fix 'isolcpus=' boot parameter handling when !CONFIG_CPUMASK_OFFSTACK (bsc#1107207).\n- sched/numa: Avoid task migration for small NUMA improvement (bsc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Do not move imbalanced load purely on the basis of an idle CPU (bsc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Evaluate move once per node (bsc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Limit the conditions where scan period is reset ().\n- sched/numa: Pass destination CPU as a parameter to migrate_task_rq (bsc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Pass destination CPU as a parameter to migrate_task_rq kabi (bsc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Remove numa_has_capacity() (bsc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Remove unused task_capacity from 'struct numa_stats' (bsc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Reset scan rate whenever task moves across nodes (bsc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Stop comparing tasks for NUMA placement after selecting an idle core (bsc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Stop multiple tasks from moving to the CPU at the same time (bsc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Stop multiple tasks from moving to the CPU at the same time kabi (bsc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: remove unused code from update_numa_stats() (bsc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: remove unused nr_running field (bsc#1101669 optimise numa balancing for fast migrate).\n- scripts/git_sort/git_sort.py: Add fixes branch from mkp/scsi.git.\n- scripts/git_sort/git_sort.py: add libnvdimm-for-next branch\n- scripts/git_sort/git_sort.py: add mkp 4.20/scsi-queue\n- scripts: modpost: check memory allocation results (bsc#1051510).\n- scsi: core: Allow state transitions from OFFLINE to BLOCKED (bsc#1112246).\n- scsi: cxlflash: Abstract hardware dependent assignments ().\n- scsi: cxlflash: Acquire semaphore before invoking ioctl services ().\n- scsi: cxlflash: Adapter context init can return error ().\n- scsi: cxlflash: Adapter context support for OCXL ().\n- scsi: cxlflash: Add argument identifier names ().\n- scsi: cxlflash: Add include guards to backend.h ().\n- scsi: cxlflash: Avoid clobbering context control register value ().\n- scsi: cxlflash: Enable OCXL operations ().\n- scsi: cxlflash: Explicitly cache number of interrupts per context ().\n- scsi: cxlflash: Handle spurious interrupts ().\n- scsi: cxlflash: Hardware AFU for OCXL ().\n- scsi: cxlflash: Introduce OCXL backend ().\n- scsi: cxlflash: Introduce OCXL context state machine ().\n- scsi: cxlflash: Introduce object handle fop ().\n- scsi: cxlflash: Isolate external module dependencies ().\n- scsi: cxlflash: Limit the debug logs in the IO path ().\n- scsi: cxlflash: MMIO map the AFU ().\n- scsi: cxlflash: Preserve number of interrupts for master contexts ().\n- scsi: cxlflash: Read host AFU configuration ().\n- scsi: cxlflash: Read host function configuration ().\n- scsi: cxlflash: Register for translation errors ().\n- scsi: cxlflash: Remove commmands from pending list on timeout ().\n- scsi: cxlflash: Remove embedded CXL work structures ().\n- scsi: cxlflash: Setup AFU PASID ().\n- scsi: cxlflash: Setup AFU acTag range ().\n- scsi: cxlflash: Setup LISNs for master contexts ().\n- scsi: cxlflash: Setup LISNs for user contexts ().\n- scsi: cxlflash: Setup OCXL transaction layer ().\n- scsi: cxlflash: Setup function OCXL link ().\n- scsi: cxlflash: Setup function acTag range ().\n- scsi: cxlflash: Staging to support future accelerators ().\n- scsi: cxlflash: Support AFU interrupt management ().\n- scsi: cxlflash: Support AFU interrupt mapping and registration ().\n- scsi: cxlflash: Support AFU reset ().\n- scsi: cxlflash: Support AFU state toggling ().\n- scsi: cxlflash: Support adapter context discovery ().\n- scsi: cxlflash: Support adapter context mmap and release ().\n- scsi: cxlflash: Support adapter context polling ().\n- scsi: cxlflash: Support adapter context reading ().\n- scsi: cxlflash: Support adapter file descriptors for OCXL ().\n- scsi: cxlflash: Support file descriptor mapping ().\n- scsi: cxlflash: Support image reload policy modification ().\n- scsi: cxlflash: Support process element lifecycle ().\n- scsi: cxlflash: Support process specific mappings ().\n- scsi: cxlflash: Support reading adapter VPD data ().\n- scsi: cxlflash: Support starting an adapter context ().\n- scsi: cxlflash: Support starting user contexts ().\n- scsi: cxlflash: Synchronize reset and remove ops ().\n- scsi: cxlflash: Use IDR to manage adapter contexts ().\n- scsi: cxlflash: Use local mutex for AFU serialization ().\n- scsi: cxlflash: Yield to active send threads ().\n- scsi: fcoe: hold disc_mutex when traversing rport lists (bsc#1077989).\n- scsi: hisi_sas: Add SATA FIS check for v3 hw ().\n- scsi: hisi_sas: Add a flag to filter PHY events during reset ().\n- scsi: hisi_sas: Add missing PHY spinlock init ().\n- scsi: hisi_sas: Adjust task reject period during host reset ().\n- scsi: hisi_sas: Drop hisi_sas_slot_abort() ().\n- scsi: hisi_sas: Fix the conflict between dev gone and host reset ().\n- scsi: hisi_sas: Fix the failure of recovering PHY from STP link timeout ().\n- scsi: hisi_sas: Implement handlers of PCIe FLR for v3 hw ().\n- scsi: hisi_sas: Only process broadcast change in phy_bcast_v3_hw() ().\n- scsi: hisi_sas: Pre-allocate slot DMA buffers ().\n- scsi: hisi_sas: Release all remaining resources in clear nexus ha ().\n- scsi: hisi_sas: Tidy hisi_sas_task_prep() ().\n- scsi: hisi_sas: Use dmam_alloc_coherent() ().\n- scsi: hisi_sas: add memory barrier in task delivery function ().\n- scsi: hisi_sas: relocate some common code for v3 hw ().\n- scsi: hisi_sas: tidy channel interrupt handler for v3 hw ().\n- scsi: hisi_sas: tidy host controller reset function a bit ().\n- scsi: hpsa: limit transfer length to 1MB, not 512kB (bsc#1102346).\n- scsi: ipr: Eliminate duplicate barriers ().\n- scsi: ipr: System hung while dlpar adding primary ipr adapter back (bsc#1109336).\n- scsi: ipr: Use dma_pool_zalloc() ().\n- scsi: ipr: fix incorrect indentation of assignment statement ().\n- scsi: libfc: Add lockdep annotations (bsc#1077989).\n- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1104731).\n- scsi: libfc: fixup 'sleeping function called from invalid context' (bsc#1077989).\n- scsi: libfc: fixup lockdep annotations (bsc#1077989).\n- scsi: libfc: hold disc_mutex in fc_disc_stop_rports() (bsc#1077989).\n- scsi: libfc: retry PRLI if we cannot analyse the payload (bsc#1104731).\n- scsi: lpfc: Correct MDS diag and nvmet configuration (bsc#1106636).\n- scsi: mpt3sas: Fix calltrace observed while running IO reset (bsc#1077989).\n- scsi: netvsc: Use the vmbus function to calculate ring buffer percentage (bsc#1107207).\n- scsi: qedi: Add the CRC size within iSCSI NVM image (bsc#1110538).\n- scsi: qedi: Initialize the stats mutex lock (bsc#1110538).\n- scsi: qla2xxx: Add appropriate debug info for invalid RX_ID (bsc#1108870).\n- scsi: qla2xxx: Add logic to detect ABTS hang and response completion (bsc#1108870).\n- scsi: qla2xxx: Add longer window for chip reset (bsc#1086327,).\n- scsi: qla2xxx: Add mode control for each physical port (bsc#1108870).\n- scsi: qla2xxx: Add support for ZIO6 interrupt threshold (bsc#1108870).\n- scsi: qla2xxx: Allow FC-NVMe underrun to be handled by transport (bsc#1108870).\n- scsi: qla2xxx: Check for Register disconnect (bsc#1108870).\n- scsi: qla2xxx: Cleanup for N2N code (bsc#1086327,).\n- scsi: qla2xxx: Decrement login retry count for only plogi (bsc#1108870).\n- scsi: qla2xxx: Defer chip reset until target mode is enabled (bsc#1108870).\n- scsi: qla2xxx: Fix ISP recovery on unload (bsc#1086327,).\n- scsi: qla2xxx: Fix Management Server NPort handle reservation logic (bsc#1086327,).\n- scsi: qla2xxx: Fix N2N link re-connect (bsc#1086327,).\n- scsi: qla2xxx: Fix NVMe Target discovery (bsc#1108870).\n- scsi: qla2xxx: Fix NVMe session hang on unload (bsc#1108870).\n- scsi: qla2xxx: Fix Remote port registration (bsc#1108870).\n- scsi: qla2xxx: Fix deadlock between ATIO and HW lock (bsc#1108870).\n- scsi: qla2xxx: Fix double increment of switch scan retry count (bsc#1108870).\n- scsi: qla2xxx: Fix driver hang when FC-NVMe LUNs are configured (bsc#1108870).\n- scsi: qla2xxx: Fix dropped srb resource (bsc#1108870).\n- scsi: qla2xxx: Fix duplicate switch database entries (bsc#1108870).\n- scsi: qla2xxx: Fix duplicate switch's Nport ID entries (bsc#1108870).\n- scsi: qla2xxx: Fix early srb free on abort (bsc#1108870).\n- scsi: qla2xxx: Fix for double free of SRB structure (bsc#1108870).\n- scsi: qla2xxx: Fix iIDMA error (bsc#1108870).\n- scsi: qla2xxx: Fix incorrect port speed being set for FC adapters (bsc#1108870).\n- scsi: qla2xxx: Fix issue reported by static checker for qla2x00_els_dcmd2_sp_done() (bsc#1086327,).\n- scsi: qla2xxx: Fix login retry count (bsc#1086327,).\n- scsi: qla2xxx: Fix memory leak for allocating abort IOCB (bsc#1111830).\n- scsi: qla2xxx: Fix out of order Termination and ABTS response (bsc#1108870).\n- scsi: qla2xxx: Fix port speed display on chip reset (bsc#1108870).\n- scsi: qla2xxx: Fix premature command free (bsc#1108870).\n- scsi: qla2xxx: Fix process response queue for ISP26XX and above (bsc#1108870).\n- scsi: qla2xxx: Fix race between switch cmd completion and timeout (bsc#1086327,).\n- scsi: qla2xxx: Fix race condition for resource cleanup (bsc#1108870).\n- scsi: qla2xxx: Fix re-using LoopID when handle is in use (bsc#1108870).\n- scsi: qla2xxx: Fix recursive mailbox timeout (bsc#1108870).\n- scsi: qla2xxx: Fix redundant fc_rport registration (bsc#1086327,).\n- scsi: qla2xxx: Fix session state stuck in Get Port DB (bsc#1086327,).\n- scsi: qla2xxx: Fix stalled relogin (bsc#1086327,).\n- scsi: qla2xxx: Fix stuck session in PLOGI state (bsc#1108870).\n- scsi: qla2xxx: Fix unintended Logout (bsc#1086327,).\n- scsi: qla2xxx: Flush mailbox commands on chip reset (bsc#1086327,).\n- scsi: qla2xxx: Force fw cleanup on ADISC error (bsc#1108870).\n- scsi: qla2xxx: Increase abort timeout value (bsc#1108870).\n- scsi: qla2xxx: Migrate NVME N2N handling into state machine (bsc#1086327,).\n- scsi: qla2xxx: Move ABTS code behind qpair (bsc#1108870).\n- scsi: qla2xxx: Move log messages before issuing command to firmware (bsc#1108870).\n- scsi: qla2xxx: Move rport registration out of internal work_list (bsc#1108870).\n- scsi: qla2xxx: Move {get|rel}_sp to base_qpair struct (bsc#1108870).\n- scsi: qla2xxx: Prevent sysfs access when chip is down (bsc#1086327,).\n- scsi: qla2xxx: Reduce holding sess_lock to prevent CPU lock-up (bsc#1108870).\n- scsi: qla2xxx: Reject bsg request if chip is down (bsc#1108870).\n- scsi: qla2xxx: Remove ASYNC GIDPN switch command (bsc#1108870).\n- scsi: qla2xxx: Remove all rports if fabric scan retry fails (bsc#1108870).\n- scsi: qla2xxx: Remove redundant check for fcport deletion (bsc#1108870).\n- scsi: qla2xxx: Remove stale ADISC_DONE event (bsc#1108870).\n- scsi: qla2xxx: Remove stale debug trace message from tcm_qla2xxx (bsc#1108870).\n- scsi: qla2xxx: Return switch command on a timeout (bsc#1108870).\n- scsi: qla2xxx: Save frame payload size from ICB (bsc#1086327,).\n- scsi: qla2xxx: Serialize mailbox request (bsc#1108870).\n- scsi: qla2xxx: Silent erroneous message (bsc#1086327,).\n- scsi: qla2xxx: Spinlock recursion in qla_target (bsc#1086327,).\n- scsi: qla2xxx: Terminate Plogi/PRLI if WWN is 0 (bsc#1108870).\n- scsi: qla2xxx: Turn off IOCB timeout timer on IOCB completion (bsc#1108870).\n- scsi: qla2xxx: Update driver to version 10.00.00.09-k (bsc#1108870).\n- scsi: qla2xxx: Update driver version to 10.00.00.08-k (bsc#1086327,).\n- scsi: qla2xxx: Update driver version to 10.00.00.10-k (bsc#1108870).\n- scsi: qla2xxx: Update driver version to 10.00.00.11-k (bsc#1108870).\n- scsi: qla2xxx: Update rscn_rcvd field to more meaningful scan_needed (bsc#1108870).\n- scsi: qla2xxx: Use correct qpair for ABTS/CMD (bsc#1108870).\n- scsi: qla2xxx: do not allow negative thresholds (bsc#1108870).\n- scsi: qla2xxx: shutdown chip if reset fail (bsc#1108870).\n- scsi: storsvc: do not set a bounce limit (bsc#1107207).\n- scsi: storvsc: Avoid allocating memory for temp cpumasks (bsc#1107207).\n- scsi: storvsc: Select channel based on available percentage of ring buffer to write (bsc#1107207).\n- scsi: storvsc: Set up correct queue depth values for IDE devices (bsc#1107207).\n- scsi: target: prefer dbroot of /etc/target over /var/target (bsc#1111928).\n- scsi: vmbus: Add function to report available ring buffer to write in total ring size percentage (bsc#1107207).\n- scsi_debug: call resp_XXX function after setting host_scribble (bsc#1069138).\n- scsi_debug: reset injection flags for every_nth > 0 (bsc#1069138).\n- security: check for kstrdup() failure in lsm_append() (bsc#1051510).\n- selftests/bpf/test_maps: exit child process without error in ENOMEM case (bsc#1083647).\n- selftests/bpf: fix a typo in map in map test (bsc#1083647).\n- selftests/x86: Add tests for User-Mode Instruction Prevention (bsc#1110006).\n- selftests/x86: Add tests for the STR and SLDT instructions (bsc#1110006).\n- serial: 8250: Do not service RX FIFO if interrupts are disabled (bsc#1051510).\n- serial: 8250: Fix clearing FIFOs in RS485 mode again (bsc#1051510).\n- serial: 8250_dw: Add ACPI support for uart on Broadcom SoC (bsc#1051510).\n- serial: 8250_dw: always set baud rate in dw8250_set_termios (bsc#1051510).\n- serial: 8250_exar: Read INT0 from slave device, too (bsc#1051510).\n- serial: core: mark port as initialized after successful IRQ change (bsc#1051510).\n- serial: cpm_uart: return immediately from console poll (bsc#1051510).\n- serial: enable spi in sc16is7xx driver References: bsc#1105672\n- serial: imx: restore handshaking irq for imx1 (bsc#1051510).\n- serial: make sc16is7xx driver supported References: bsc#1105672\n- serial: pxa: Fix an error handling path in 'serial_pxa_probe()' (bsc#1051510).\n- serial: sh-sci: Stop RX FIFO timer during port shutdown (bsc#1051510).\n- serial: xuartps: fix typo in cdns_uart_startup (bsc#1051510).\n- series.conf: moved some Xen patches to the sorted region xen/blkfront: correct purging of persistent grants (bsc#1112514).\n- signal: Properly deliver SIGSEGV from x86 uprobes (bsc#1110006).\n- slab: __GFP_ZERO is incompatible with a constructor (bsc#1107060).\n- smb2: fix missing files in root share directory listing (bsc#1112907).\n- smb3: fill in statfs fsid and correct namelen (bsc#1112905).\n- smb3: fix reset of bytes read and written stats (bsc#1112906).\n- smb3: on reconnect set PreviousSessionId field (bsc#1112899).\n- smsc75xx: Check for Wake-on-LAN modes (bsc#1051510).\n- smsc95xx: Check for Wake-on-LAN modes (bsc#1051510).\n- soc/tegra: pmc: Fix child-node lookup (bsc#1051510).\n- soc: fsl: qe: Fix copy/paste bug in ucc_get_tdm_sync_shift() (bsc#1051510).\n- soc: mediatek: pwrap: fix cipher init setting error (bsc#1051510).\n- sock_diag: fix use-after-free read in __sk_free (bsc#1051510).\n- soreuseport: initialise timewait reuseport field (bsc#1051510).\n- sound: do not call skl_init_chip() to reset intel skl soc (bsc#1051510).\n- sound: enable interrupt after dma buffer initialization (bsc#1051510).\n- spi-nor: intel-spi: Fix number of protected range registers for BYT/LPT ().\n- spi/bcm63xx-hsspi: keep pll clk enabled (bsc#1051510).\n- spi: bcm-qspi: switch back to reading flash using smaller chunks (bsc#1051510).\n- spi: cadence: Change usleep_range() to udelay(), for atomic context (bsc#1051510).\n- spi: davinci: fix a NULL pointer dereference (bsc#1051510).\n- spi: pxa2xx: Add support for Intel Ice Lake (bsc#1051510).\n- spi: rspi: Fix interrupted DMA transfers (bsc#1051510).\n- spi: rspi: Fix invalid SPI use during system suspend (bsc#1051510).\n- spi: sh-msiof: Fix handling of write value for SISTR register (bsc#1051510).\n- spi: sh-msiof: Fix invalid SPI use during system suspend (bsc#1051510).\n- spi: sh-msiof: fix deferred probing (bsc#1051510).\n- spi: tegra20-slink: explicitly enable/disable clock (bsc#1051510).\n- squashfs metadata 2: electric boogaloo (bsc#1051510).\n- squashfs: be more careful about metadata corruption (bsc#1051510).\n- squashfs: more metadata hardening (bsc#1051510).\n- squashfs: more metadata hardening (bsc#1051510).\n- sr9800: Check for supported Wake-on-LAN modes (bsc#1051510).\n- sr: get/drop reference to device in revalidate and check_events (bsc#1109979).\n- staging: bcm2835-audio: Check if workqueue allocation failed ().\n- staging: bcm2835-audio: Deliver indirect-PCM transfer error ().\n- staging: bcm2835-audio: Disconnect and free vchi_instance on module_exit() ().\n- staging: bcm2835-audio: Do not leak workqueue if open fails ().\n- staging: bcm2835-audio: constify snd_pcm_ops structures ().\n- staging: bcm2835-audio: make snd_pcm_hardware const ().\n- staging: bcm2835-camera: fix timeout handling in wait_for_completion_timeout (bsc#1051510).\n- staging: bcm2835-camera: handle wait_for_completion_timeout return properly (bsc#1051510).\n- staging: comedi: ni_mio_common: fix subdevice flags for PFI subdevice (bsc#1051510).\n- staging: comedi: ni_mio_common: protect register write overflow (bsc#1051510).\n- staging: lustre: Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1051510).\n- staging: lustre: disable preempt while sampling processor id (bsc#1051510).\n- staging: lustre: fix bug in osc_enter_cache_try (bsc#1051510).\n- staging: lustre: ldlm: free resource when ldlm_lock_create() fails (bsc#1051510).\n- staging: lustre: libcfs: Prevent harmless read underflow (bsc#1051510).\n- staging: lustre: libcfs: fix test for libcfs_ioctl_hdr minimum size (bsc#1051510).\n- staging: lustre: llite: correct removexattr detection (bsc#1051510).\n- staging: lustre: llite: initialize xattr->xe_namelen (bsc#1051510).\n- staging: lustre: lmv: correctly iput lmo_root (bsc#1051510).\n- staging: lustre: lov: use correct env in lov_io_data_version_end() (bsc#1051510).\n- staging: lustre: o2iblnd: Fix FastReg map/unmap for MLX5 (bsc#1051510).\n- staging: lustre: o2iblnd: Fix crash in kiblnd_handle_early_rxs() (bsc#1051510).\n- staging: lustre: o2iblnd: fix race at kiblnd_connect_peer (bsc#1051510).\n- staging: lustre: obd_mount: use correct niduuid suffix (bsc#1051510).\n- staging: lustre: obdclass: return -EFAULT if copy_from_user() fails (bsc#1051510).\n- staging: lustre: ptlrpc: kfree used instead of kvfree (bsc#1051510).\n- staging: lustre: remove invariant in cl_io_read_ahead() (bsc#1051510).\n- staging: lustre: statahead: remove incorrect test on agl_list_empty() (bsc#1051510).\n- staging: rts5208: fix missing error check on call to rtsx_write_register (bsc#1051510).\n- staging: vc04_services: Fix platform_no_drv_owner.cocci warnings ().\n- staging: vc04_services: bcm2835-audio Format multiline comment ().\n- staging: vc04_services: bcm2835-audio: Add blank line after declaration ().\n- staging: vc04_services: bcm2835-audio: Change to unsigned int * ().\n- staging: vc04_services: bcm2835-audio: add SPDX identifiers ().\n- staging: vc04_services: bcm2835-audio: remove redundant license text ().\n- staging: vc04_services: please do not use multiple blank lines ().\n- stm: Potential read overflow in stm_char_policy_set_ioctl() (bsc#1051510).\n- stmmac: fix DMA channel hang in half-duplex mode (networking-stable-18_07_19).\n- string: drop __must_check from strscpy() and restore strscpy() usages in cgroup (bsc#1051510).\n- strparser: Remove early eaten to fix full tcp receive buffer stall (networking-stable-18_07_19).\n- sunxi-rsb: Include OF based modalias in device uevent (bsc#1051510).\n- switchtec: Fix Spectre v1 vulnerability (bsc#1051510).\n- sys: do not hold uts_sem while accessing userspace memory (bsc#1106995).\n- sysfs: Do not return POSIX ACL xattrs via listxattr (git-fixes).\n- target: log Data-Out timeouts as errors (bsc#1095805).\n- target: log NOP ping timeouts as errors (bsc#1095805).\n- target: split out helper for cxn timeout error stashing (bsc#1095805).\n- target: stash sess_err_stats on Data-Out timeout (bsc#1095805).\n- target: use ISCSI_IQN_LEN in iscsi_target_stat (bsc#1095805).\n- target_core_rbd: break up free_device callback (bsc#1105524).\n- target_core_rbd: use RCU in free_device (bsc#1105524).\n- team: Forbid enslaving team device to itself (bsc#1051510).\n- thermal: of-thermal: disable passive polling when thermal zone is disabled (bsc#1051510).\n- thermal: thermal_hwmon: Convert to hwmon_device_register_with_info() (bsc#1103363).\n- thermal_hwmon: Pass the originating device down to hwmon_device_register_with_info (bsc#1103363).\n- thermal_hwmon: Sanitize attribute name passed to hwmon (bsc#1103363).\n- ti: ethernet: cpdma: Use correct format for genpool_* (bsc#1051510).\n- tools build: fix # escaping in .cmd files for future Make (git-fixes).\n- tools/hv: Fix IP reporting by KVP daemon with SRIOV (bsc#1107207).\n- tools/power turbostat: Read extended processor family from CPUID (bsc#1051510).\n- tools/power turbostat: fix -S on UP systems (bsc#1051510).\n- tools/vm/page-types.c: fix 'defined but not used' warning (bsc#1051510).\n- tools/vm/slabinfo.c: fix sign-compare warning (bsc#1051510).\n- tools: hv: fcopy: set 'error' in case an unknown operation was requested (bsc#1107207).\n- tools: hv: fix compiler warnings about major/target_fname (bsc#1107207).\n- tools: hv: include string.h in hv_fcopy_daemon (bsc#1107207).\n- tools: hv: update lsvmbus to be compatible with python3 (bsc#1107207).\n- tools: usb: ffs-test: Fix build on big endian systems (bsc#1051510).\n- tpm: Introduce flag TPM_TRANSMIT_RAW (bsc#1082555).\n- tpm: cmd_ready command can be issued only after granting locality (bsc#1082555).\n- tpm: fix race condition in tpm_common_write() (bsc#1082555).\n- tpm: fix use after free in tpm2_load_context() (bsc#1082555).\n- tpm: separate cmd_ready/go_idle from runtime_pm (bsc#1082555).\n- tpm: tpm_crb: relinquish locality on error path (bsc#1082555).\n- tpm: vtpm_proxy: Implement request_locality function (bsc#1082555).\n- tracepoint: Do not warn on ENOMEM (bsc#1051510).\n- tracing/x86/xen: Remove zero data size trace events trace_xen_mmu_flush_tlb{_all} (bsc#1110006).\n- tracing: Add barrier to trace_printk() buffer nesting modification (bsc#1112219).\n- tsl2550: fix lux1_input error in low light (bsc#1051510).\n- tty/ldsem: Add lockdep asserts for ldisc_sem (bsc#1105428).\n- tty/ldsem: Convert to regular lockdep annotations (bsc#1105428).\n- tty/ldsem: Decrement wait_readers on timeouted down_read() (bsc#1105428).\n- tty/ldsem: Wake up readers after timed out down_write() (bsc#1105428).\n- tty: Do not block on IO when ldisc change is pending (bsc#1105428).\n- tty: Drop tty->count on tty_reopen() failure (bsc#1051510).\n- tty: Hold tty_ldisc_lock() during tty_reopen() (bsc#1105428).\n- tty: Simplify tty->count math in tty_reopen() (bsc#1105428).\n- tty: fix data race between tty_init_dev and flush of buf (bsc#1105428).\n- tty: fix termios input-speed encoding (bsc#1051510).\n- tty: fix termios input-speed encoding when using BOTHER (bsc#1051510).\n- tty: rocket: Fix possible buffer overwrite on register_PCI (bsc#1051510).\n- tty: serial: 8250: Revert NXP SC16C2552 workaround (bsc#1051510).\n- tty: serial: exar: Relocate sleep wake-up handling (bsc#1051510).\n- tty: serial: lpuart: avoid leaking struct tty_struct (bsc#1051510).\n- tty: vt_ioctl: fix potential Spectre v1 (bsc#1051510).\n- uart: fix race between uart_put_char() and uart_shutdown() (bsc#1051510).\n- ubifs: Check data node size before truncate (bsc#1051510).\n- ubifs: Check for name being NULL while mounting (bsc#1051510).\n- ubifs: Fix directory size calculation for symlinks (bsc#1106230).\n- ubifs: Fix memory leak in lprobs self-check (bsc#1051510).\n- ubifs: Fix synced_i_size calculation for xattr inodes (bsc#1051510).\n- ubifs: xattr: Do not operate on deleted inodes (bsc#1051510).\n- udl-kms: avoid division (bsc#1051510).\n- udl-kms: change down_interruptible to down (bsc#1051510).\n- udl-kms: fix crash due to uninitialized memory (bsc#1051510).\n- udl-kms: handle allocation failure (bsc#1051510).\n- udlfb: set optimal write delay (bsc#1051510).\n- udp: Unbreak modules that rely on external __skb_recv_udp() availability (bsc#1109151).\n- uio, lib: Fix CONFIG_ARCH_HAS_UACCESS_MCSAFE compilation (bsc#1098782).\n- uio: potential double frees if __uio_register_device() fails (bsc#1051510).\n- uio_hv_generic: fix subchannel ring mmap (bsc#1107207).\n- uio_hv_generic: make ring buffer attribute for primary channel (bsc#1107207).\n- uio_hv_generic: set size of ring buffer attribute (bsc#1107207).\n- uio_hv_generic: support sub-channels (bsc#1107207).\n- uio_hv_generic: use correct channel in isr (bsc#1107207).\n- uprobes/x86: Prohibit probing on MOV SS instruction (bsc#1110006).\n- uprobes/x86: Remove incorrect WARN_ON() in uprobe_init_insn() (bsc#1051510).\n- uprobes: Use synchronize_rcu() not synchronize_sched() (bsc#1051510).\n- usb/phy: fix PPC64 build errors in phy-fsl-usb.c (bsc#1051510).\n- usb: Avoid use-after-free by flushing endpoints early in usb_set_interface() (bsc#1051510).\n- usb: Do not die twice if PCI xhci host is not responding in resume (bsc#1051510).\n- usb: cdc_acm: Do not leak URB buffers (bsc#1051510).\n- usb: chipidea: Prevent unbalanced IRQ disable (bsc#1051510).\n- usb: dwc2: Turn on uframe_sched on 'amlogic' platforms (bsc#1102881).\n- usb: dwc2: Turn on uframe_sched on 'bcm' platforms (bsc#1102881).\n- usb: dwc2: Turn on uframe_sched on 'his' platforms (bsc#1102881).\n- usb: dwc2: Turn on uframe_sched on 'stm32f4x9_fsotg' platforms (bsc#1102881).\n- usb: dwc2: fix isoc split in transfer with no data (bsc#1051510).\n- usb: dwc2: gadget: Fix issue in dwc2_gadget_start_isoc() (bsc#1051510).\n- usb: dwc3: change stream event enable bit back to 13 (bsc#1051510).\n- usb: dwc3: pci: add support for Intel IceLake (bsc#1051510).\n- usb: gadget: composite: fix delayed_status race condition when set_interface (bsc#1051510).\n- usb: gadget: dwc2: fix memory leak in gadget_init() (bsc#1051510).\n- usb: gadget: fotg210-udc: Fix memory leak of fotg210->ep[i] (bsc#1051510).\n- usb: gadget: fsl_udc_core: check allocation return value and cleanup on failure (bsc#1051510).\n- usb: gadget: fsl_udc_core: fixup struct_udc_setup documentation (bsc#1051510).\n- usb: gadget: r8a66597: Fix a possible sleep-in-atomic-context bugs in r8a66597_queue() (bsc#1051510).\n- usb: gadget: r8a66597: Fix two possible sleep-in-atomic-context bugs in init_controller() (bsc#1051510).\n- usb: gadget: udc: renesas_usb3: fix maxpacket size of ep0 (bsc#1051510).\n- usb: host: u132-hcd: Fix a sleep-in-atomic-context bug in u132_get_frame() (bsc#1051510).\n- usb: misc: uss720: Fix two sleep-in-atomic-context bugs (bsc#1051510).\n- usb: musb: dsps: do not disable CPPI41 irq in driver teardown (bsc#1051510).\n- usb: uas: add support for more quirk flags (bsc#1051510).\n- usb: wusbcore: security: cast sizeof to int for comparison (bsc#1051510).\n- usb: xhci-mtk: resume USB3 roothub first (bsc#1051510).\n- usb: xhci: increase CRS timeout value (bsc#1051510).\n- usbip: tools: fix atoi() on non-null terminated string (bsc#1051510).\n- use the new async probing feature for the hyperv drivers (bsc#1107207).\n- userfaultfd: hugetlbfs: fix userfaultfd_huge_must_wait() pte access (bsc#1109739).\n- userns: move user access out of the mutex (bsc#1051510).\n- uwb: hwa-rc: fix memory leak at probe (bsc#1051510).\n- vfio/pci: Virtualize Maximum Payload Size (bsc#1051510).\n- vfio/pci: Virtualize Maximum Read Request Size (bsc#1051510).\n- vfio/type1: Fix task tracking for QEMU vCPU hotplug (bsc#1051510).\n- vfs/proc/kcore, x86/mm/kcore: Fix SMAP fault when dumping vsyscall user page (bsc#1110006).\n- vfs: fix freeze protection in mnt_want_write_file() for overlayfs (git-fixes).\n- vhost: correctly check the iova range when waking virtqueue (bsc#1051510).\n- vhost: do not try to access device IOTLB when not initialized (bsc#1051510).\n- vhost: reset metadata cache when initializing new IOTLB (netfilter-stable-18_08_17).\n- vhost: use mutex_lock_nested() in vhost_dev_lock_vqs() (bsc#1051510).\n- vhost_net: validate sock before trying to put its fd (networking-stable-18_07_19).\n- video: fbdev: pxafb: clear allocated memory for video modes (bsc#1051510).\n- video: goldfishfb: fix memory leak on driver remove (bsc#1051510).\n- virtio: pci-legacy: Validate queue pfn (bsc#1051510).\n- vmbus: do not return values for uninitalized channels (bsc#1051510).\n- vmbus: do not return values for uninitalized channels (bsc#1107207).\n- vmci: type promotion bug in qp_host_get_user_memory() (bsc#1105355).\n- vmw_balloon: VMCI_DOORBELL_SET does not check status (bsc#1051510).\n- vmw_balloon: do not use 2MB without batching (bsc#1051510).\n- vmw_balloon: fix VMCI use when balloon built into kernel (bsc#1051510).\n- vmw_balloon: fix inflation of 64-bit GFNs (bsc#1051510).\n- vmw_balloon: remove inflation rate limiting (bsc#1051510).\n- vsock: split dwork to avoid reinitializations (netfilter-stable-18_08_17).\n- vti4: Do not count header length twice on tunnel setup (bsc#1051510).\n- vti6: fix PMTU caching and reporting on xmit (bsc#1051510).\n- vti6: remove !skb->ignore_df check from vti6_xmit() (bsc#1051510).\n- vxlan: add new fdb alloc and create helpers (netfilter-stable-18_07_27).\n- vxlan: fix default fdb entry netlink notify ordering during netdev create (netfilter-stable-18_07_27).\n- vxlan: make netlink notify in vxlan_fdb_destroy optional (netfilter-stable-18_07_27).\n- wan/fsl_ucc_hdlc: use IS_ERR_VALUE() to check return value of qe_muram_alloc (bsc#1051510).\n- watchdog: Mark watchdog touch functions as notrace (git-fixes).\n- wlcore: Add missing PM call for wlcore_cmd_wait_for_event_or_timeout() (bsc#1051510).\n- wlcore: Set rx_status boottime_ns field on rx (bsc#1051510).\n- x86-64/realmode: Add instruction suffix (bsc#1110006).\n- x86/CPU/AMD: Derive CPU topology from CPUID function 0xB when available ().\n- x86/CPU/AMD: Have smp_num_siblings and cpu_llc_id always be present (bsc#1110006).\n- x86/CPU: Add a microcode loader callback (bsc#1110006).\n- x86/CPU: Check CPU feature bits after microcode upgrade (bsc#1110006).\n- x86/CPU: Modify detect_extended_topology() to return result ().\n- x86/EISA: Do not probe EISA bus for Xen PV guests (bsc#1110006).\n- x86/Hyper-V/hv_apic: Build the Hyper-V APIC conditionally (bsc#1107207).\n- x86/Hyper-V/hv_apic: Include asm/apic.h (bsc#1107207).\n- x86/KVM/VMX: Do not set l1tf_flush_l1d from vmx_handle_external_intr() (bsc#1110006).\n- x86/KVM/VMX: Do not set l1tf_flush_l1d to true from vmx_l1d_flush() (bsc#1110006).\n- x86/KVM/VMX: Move the l1tf_flush_l1d test to vmx_l1d_flush() (bsc#1110006).\n- x86/KVM/VMX: Replace 'vmx_l1d_flush_always' with 'vmx_l1d_flush_cond' (bsc#1110006).\n- x86/Kconfig: Limit NR_CPUS on 32-bit to a sane amount (bsc#1110006).\n- x86/LDT: Avoid warning in 32-bit builds with older gcc (bsc#1110006).\n- x86/MCE/AMD: Define a function to get SMCA bank type (bsc#1110006).\n- x86/MCE: Fix stack out-of-bounds write in mce-inject.c: Flags_read() (bsc#1110006).\n- x86/MCE: Remove min interval polling limitation (bsc#1110006).\n- x86/MCE: Report only DRAM ECC as memory errors on AMD systems (bsc#1110006).\n- x86/MCE: Serialize sysfs changes (bsc#1110006).\n- x86/PCI: Make broadcom_postcore_init() check acpi_disabled (bsc#1110006).\n- x86/acpi: Prevent X2APIC id 0xffffffff from being accounted (bsc#1110006).\n- x86/alternatives: Fixup alternative_call_2 (bsc#1110006).\n- x86/apic/vector: Fix off by one in error path (bsc#1110006).\n- x86/apic: Fix restoring boot IRQ mode in reboot and kexec/kdump (bsc#1110006).\n- x86/apic: Set up through-local-APIC mode on the boot CPU if 'noapic' specified (bsc#1110006).\n- x86/apic: Split disable_IO_APIC() into two functions to fix CONFIG_KEXEC_JUMP=y (bsc#1110006).\n- x86/apic: Split out restore_boot_irq_mode() from disable_IO_APIC() (bsc#1110006).\n- x86/asm/memcpy_mcsafe: Add labels for __memcpy_mcsafe() write fault handling (bsc#1098782).\n- x86/asm/memcpy_mcsafe: Add write-protection-fault handling (bsc#1098782).\n- x86/asm/memcpy_mcsafe: Define copy_to_iter_mcsafe() (bsc#1098782).\n- x86/asm/memcpy_mcsafe: Fix copy_to_user_mcsafe() exception handling (bsc#1098782).\n- x86/asm/memcpy_mcsafe: Provide original memcpy_mcsafe_unrolled (bsc#1098782).\n- x86/asm/memcpy_mcsafe: Remove loop unrolling (bsc#1098782).\n- x86/asm/memcpy_mcsafe: Return bytes remaining (bsc#1098782).\n- x86/asm: Add _ASM_ARG* constants for argument registers to asm/asm.h (bsc#1110006).\n- x86/asm: Allow again using asm.h when building for the 'bpf' clang target (bsc#1110006).\n- x86/asm: Do not use the confusing '.ifeq' directive (bsc#1110006).\n- x86/boot/64: Verify alignment of the LOAD segment (bsc#1110006).\n- x86/boot/KASLR: Work around firmware bugs by excluding EFI_BOOT_SERVICES_* and EFI_LOADER_* from KASLR's choice (bsc#1112878).\n- x86/boot/compressed/64: Print error if 5-level paging is not supported (bsc#1110006).\n- x86/boot: Fix if_changed build flip/flop bug (bsc#1110006).\n- x86/boot: Fix kexec booting failure in the SEV bit detection code (bsc#1110301).\n- x86/boot: Move EISA setup to a separate file (bsc#1110006).\n- x86/boot: Relocate definition of the initial state of CR0 (bsc#1110006).\n- x86/build/64: Force the linker to use 2MB page size (bsc#1109603).\n- x86/build: Beautify build log of syscall headers (bsc#1110006).\n- x86/cpu/AMD: Apply the Erratum 688 fix when the BIOS does not (bsc#1110006).\n- x86/cpu/intel: Add missing TLB cpuid values (bsc#1110006).\n- x86/cpufeature: Add User-Mode Instruction Prevention definitions (bsc#1110006).\n- x86/cpufeatures: Add Intel PCONFIG cpufeature (bsc#1110006).\n- x86/cpufeatures: Add Intel Total Memory Encryption cpufeature (bsc#1110006).\n- x86/debug: Handle warnings before the notifier chain, to fix KGDB crash (bsc#1110006).\n- x86/decoder: Add new TEST instruction pattern (bsc#1110006).\n- x86/dumpstack: Save first regs set for the executive summary (bsc#1110006).\n- x86/dumpstack: Unify show_regs() (bsc#1110006).\n- x86/efi: Fix efi_call_phys_epilog() with CONFIG_X86_5LEVEL=y (bsc#1110006).\n- x86/eisa: Add missing include (bsc#1110006).\n- x86/entry/64: Add two more instruction suffixes (bsc#1110006).\n- x86/entry/64: Remove %ebx handling from error_entry/exit (bsc#1102715).\n- x86/entry/64: Use 'xorl' for faster register clearing (bsc#1110006).\n- x86/entry/64: Wipe KASAN stack shadow before rewind_stack_do_exit() (bsc#1110006).\n- x86/entry: Reduce the code footprint of the 'idtentry' macro (bsc#1110006).\n- x86/entry: Use SYSCALL_DEFINE() macros for sys_modify_ldt() (bsc#1110006).\n- x86/espfix/64: Fix espfix double-fault handling on 5-level systems (bsc#1110006).\n- x86/events/intel/ds: Fix bts_interrupt_threshold alignment (git-fixes c1961a4631da).\n- x86/fpu/debug: Remove unused 'x86_fpu_state' and 'x86_fpu_deactivate_state' tracepoints (bsc#1110006).\n- x86/fpu: Make XSAVE check the base CPUID features before enabling (bsc#1110006).\n- x86/fpu: Parse clearcpuid= as early XSAVE argument (bsc#1110006).\n- x86/fpu: Remove second definition of fpu in __fpu__restore_sig() (bsc#1110006).\n- x86/fpu: Remove the explicit clearing of XSAVE dependent features (bsc#1110006).\n- x86/headers/UAPI: Use __u64 instead of u64 in uapi/asm/hyperv.h (bsc#1107207).\n- x86/hyper-V: Allocate the IDT entry early in boot (bsc#1107207).\n- x86/hyper-v: Check cpumask_to_vpset() return value in hyperv_flush_tlb_others_ex() (bsc#1107207).\n- x86/hyper-v: Check for VP_INVAL in hyperv_flush_tlb_others() (bsc#1107207).\n- x86/hyper-v: Fix the circular dependency in IPI enlightenment (bsc#1107207).\n- x86/hyper-v: Fix wrong merge conflict resolution (bsc#1107207).\n- x86/hyper-v: Implement hv_do_fast_hypercall16 (bsc#1107207).\n- x86/hyper-v: Trace PV IPI send (bsc#1107207).\n- x86/hyper-v: Use 'fast' hypercall for HVCALL_SEND_IPI (bsc#1107207).\n- x86/hyper-v: Use cheaper HVCALL_FLUSH_VIRTUAL_ADDRESS_{LIST,SPACE} hypercalls when possible (bsc#1107207).\n- x86/hyper-v: Use cheaper HVCALL_SEND_IPI hypercall when possible (bsc#1107207).\n- x86/hyper-v: allocate and use Virtual Processor Assist Pages (bsc#1107207).\n- x86/hyper-v: define struct hv_enlightened_vmcs and clean field bits (bsc#1107207).\n- x86/hyper-v: detect nested features (bsc#1107207).\n- x86/hyper-v: move definitions from TLFS to hyperv-tlfs.h (bsc#1107207).\n- x86/hyper-v: move hyperv.h out of uapi (bsc#1107207).\n- x86/hyper-v: move struct hv_flush_pcpu{,ex} definitions to common header (bsc#1107207).\n- x86/hyper-v: rename ipi_arg_{ex,non_ex} structures (bsc#1107207).\n- x86/hyperv: Add a function to read both TSC and TSC page value simulateneously (bsc#1107207).\n- x86/hyperv: Add interrupt handler annotations (bsc#1107207).\n- x86/hyperv: Check for required priviliges in hyperv_init() (bsc#1107207).\n- x86/hyperv: Check for required priviliges in hyperv_init() (bsc#1110006).\n- x86/hyperv: Redirect reenlightment notifications on CPU offlining (bsc#1107207).\n- x86/hyperv: Reenlightenment notifications support (bsc#1107207).\n- x86/idt: Load idt early in start_secondary (bsc#1110006).\n- x86/init: fix build with CONFIG_SWAP=n (bsc#1106121).\n- x86/intel_rdt: Enable CMT and MBM on new Skylake stepping (bsc#1110006).\n- x86/intel_rdt: Fix incorrect returned value when creating rdgroup sub-directory in resctrl file system (bsc#1110006).\n- x86/intel_rdt: Fix potential deadlock during resctrl mount (bsc#1110006).\n- x86/intel_rdt: Fix potential deadlock during resctrl unmount (bsc#1110006).\n- x86/irq: Count Hyper-V reenlightenment interrupts (bsc#1107207).\n- x86/irq: Remove an old outdated comment about context tracking races (bsc#1110006).\n- x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772).\n- x86/kasan/64: Teach KASAN about the cpu_entry_area (kasan).\n- x86/kasan: Panic if there is not enough memory to boot (bsc#1110006).\n- x86/kexec: Avoid double free_page() upon do_kexec_load() failure (bsc#1110006).\n- x86/kexec: Correct KEXEC_BACKUP_SRC_END off-by-one error (bsc#1114279).\n- x86/kexec: Make kexec (mostly) work in 5-level paging mode (bsc#1110006).\n- x86/kprobes: Fix kernel crash when probing .entry_trampoline code (bsc#1110006).\n- x86/kvm/hyper-v: add reenlightenment MSRs support (bsc#1107207).\n- x86/kvm/hyper-v: inject #GP only when invalid SINTx vector is unmasked (bsc#1107207).\n- x86/kvm/hyper-v: remove stale entries from vec_bitmap/auto_eoi_bitmap on vector change (bsc#1107207).\n- x86/kvm/vmx: Remove duplicate l1d flush definitions (bsc#1110006).\n- x86/kvm: fix LAPIC timer drift when guest uses periodic mode (bsc#1106240).\n- x86/kvm: rename HV_X64_MSR_APIC_ASSIST_PAGE to HV_X64_MSR_VP_ASSIST_PAGE (bsc#1107207).\n- x86/mce/AMD: Get address from already initialized block (bsc#1110006).\n- x86/mce: Add notifier_block forward declaration (bsc#1110006).\n- x86/mce: Check for alternate indication of machine check recovery on Skylake (bsc#1110006).\n- x86/mce: Do not overwrite MCi_STATUS in mce_no_way_out() (bsc#1110006).\n- x86/mce: Fix incorrect 'Machine check from unknown source' message (bsc#1110006).\n- x86/mce: Fix set_mce_nospec() to avoid #GP fault (bsc#1107783).\n- x86/mce: Improve error message when kernel cannot recover (bsc#1110006).\n- x86/mce: Improve error message when kernel cannot recover (bsc#1110301).\n- x86/mcelog: Get rid of RCU remnants (git-fixes 5de97c9f6d85).\n- x86/memory_failure: Introduce {set, clear}_mce_nospec() (bsc#1107783).\n- x86/microcode/intel: Check microcode revision before updating sibling threads (bsc#1110006).\n- x86/microcode/intel: Fix memleak in save_microcode_patch() (bsc#1110006).\n- x86/microcode/intel: Look into the patch cache first (bsc#1110006).\n- x86/microcode/intel: Save microcode patch unconditionally (bsc#1110006).\n- x86/microcode/intel: Writeback and invalidate caches before updating microcode (bsc#1110006).\n- x86/microcode: Allow late microcode loading with SMT disabled (bsc#1110006).\n- x86/microcode: Attempt late loading only when new microcode is present (bsc#1110006).\n- x86/microcode: Do not exit early from __reload_late() (bsc#1110006).\n- x86/microcode: Do not upload microcode if CPUs are offline (bsc#1110006).\n- x86/microcode: Fix CPU synchronization routine (bsc#1110006).\n- x86/microcode: Get rid of struct apply_microcode_ctx (bsc#1110006).\n- x86/microcode: Make sure boot_cpu_data.microcode is up-to-date (bsc#1110006).\n- x86/microcode: Make the late update update_lock a raw lock for RT (bsc#1110006).\n- x86/microcode: Propagate return value from updating functions (bsc#1110006).\n- x86/microcode: Request microcode on the BSP (bsc#1110006).\n- x86/microcode: Synchronize late microcode loading (bsc#1110006).\n- x86/microcode: Update the new microcode revision unconditionally (bsc#1110006).\n- x86/mm/32: Initialize the CR4 shadow before __flush_tlb_all() (bsc#1110006).\n- x86/mm/64: Rename the register_page_bootmem_memmap() 'size' parameter to 'nr_pages' (bsc#1110006).\n- x86/mm/kasan: Do not use vmemmap_populate() to initialize shadow (kasan).\n- x86/mm/kmmio: Fix mmiotrace for page unaligned addresses (bsc#1110006).\n- x86/mm/kmmio: Make the tracer robust against L1TF (bsc#1110006).\n- x86/mm/memory_hotplug: determine block size based on the end of boot memory (bsc#1108243).\n- x86/mm/pat: Make set_memory_np() L1TF safe (bsc#1110006).\n- x86/mm/pat: Prepare {reserve, free}_memtype() for 'decoy' addresses (bsc#1107783).\n- x86/mm/pti: Add an overflow check to pti_clone_pmds() (bsc#1110006).\n- x86/mm/pti: Fix PTI comment in entry_SYSCALL_64() (bsc#1110006).\n- x86/mm/tlb: Always use lazy TLB mode (bsc#1105467 Reduce IPIs and atomic ops with improved lazy TLB).\n- x86/mm/tlb: Leave lazy TLB mode at page table free time (bsc#1105467 Reduce IPIs and atomic ops with improved lazy TLB).\n- x86/mm/tlb: Make lazy TLB mode lazier (bsc#1105467 Reduce IPIs and atomic ops with improved lazy TLB).\n- x86/mm/tlb: Only send page table free TLB flush to lazy TLB CPUs (bsc#1105467 Reduce IPIs and atomic ops with improved lazy TLB).\n- x86/mm/tlb: Restructure switch_mm_irqs_off() (bsc#1105467 Reduce IPIs and atomic ops with improved lazy TLB).\n- x86/mm/tlb: Skip atomic operations for 'init_mm' in switch_mm_irqs_off() (bsc#1105467 Reduce IPIs and atomic ops with improved lazy TLB).\n- x86/mm: Add TLB purge to free pmd/pte page interfaces (bsc#1110006).\n- x86/mm: Define _PAGE_TABLE using _KERNPG_TABLE (bsc#1110006).\n- x86/mm: Disable ioremap free page handling on x86-PAE (bsc#1110006).\n- x86/mm: Do not forbid _PAGE_RW before init for __ro_after_init (bsc#1110006).\n- x86/mm: Drop TS_COMPAT on 64-bit exec() syscall (bsc#1110006).\n- x86/mm: Expand static page table for fixmap space (bsc#1110006).\n- x86/mm: Fix ELF_ET_DYN_BASE for 5-level paging (bsc#1110006).\n- x86/mm: Fix bogus warning during EFI bootup, use boot_cpu_has() instead of this_cpu_has() in build_cr3_noflush() (bsc#1110006).\n- x86/mm: Relocate page fault error codes to traps.h (bsc#1110006).\n- x86/mm: Remove in_nmi() warning from vmalloc_fault() (bsc#1110006).\n- x86/mm: implement free pmd/pte page interfaces (bsc#1110006).\n- x86/mpx: Do not allow MPX if we have mappings above 47-bit (bsc#1110006).\n- x86/nmi: Fix NMI uaccess race against CR3 switching (bsc#1110006).\n- x86/numa_emulation: Fix emulated-to-physical node mapping (bsc#1110006).\n- x86/oprofile: Fix bogus GCC-8 warning in nmi_setup() (bsc#1110006).\n- x86/pae: use 64 bit atomic xchg function in native_ptep_get_and_clear (bsc#1110006).\n- x86/paravirt: Fix some warning messages (bsc#1065600).\n- x86/paravirt: Fix spectre-v2 mitigations for paravirt guests (bsc#1065600).\n- x86/paravirt: Remove 'noreplace-paravirt' cmdline option (bsc#1110006).\n- x86/percpu: Fix this_cpu_read() (bsc#1110006).\n- x86/pgtable: Do not set huge PUD/PMD on non-leaf entries (bsc#1110006).\n- x86/pkeys: Do not special case protection key 0 (bsc#1110006).\n- x86/pkeys: Override pkey when moving away from PROT_EXEC (bsc#1110006).\n- x86/platform/UV: Add adjustable set memory block size function (bsc#1108243).\n- x86/platform/UV: Add kernel parameter to set memory block size (bsc#1108243).\n- x86/platform/UV: Mark memblock related init code and data correctly (bsc#1108243).\n- x86/platform/UV: Use new set memory block size function (bsc#1108243).\n- x86/power: Fix swsusp_arch_resume prototype (bsc#1110006).\n- x86/process: Do not mix user/kernel regs in 64bit __show_regs() (bsc#1110006).\n- x86/process: Re-export start_thread() (bsc#1110006).\n- x86/pti: Check the return value of pti_user_pagetable_walk_p4d() (bsc#1110006).\n- x86/pti: Check the return value of pti_user_pagetable_walk_pmd() (bsc#1110006).\n- x86/retpoline/checksum32: Convert assembler indirect jumps (bsc#1110006).\n- x86/retpoline/irq32: Convert assembler indirect jumps (bsc#1110006).\n- x86/smp: fix non-SMP broken build due to redefinition of apic_id_is_primary_thread (bsc#1110006).\n- x86/smpboot: Do not use mwait_play_dead() on AMD systems (bsc#1110006).\n- x86/spectre: Add missing family 6 check to microcode check (git-fixes a5b296636453).\n- x86/spectre: Fix spelling mistake: 'vunerable'-> 'vulnerable' (bsc#1110006).\n- x86/speculation, objtool: Annotate indirect calls/jumps for objtool on 32-bit kernels (bsc#1110006).\n- x86/speculation/l1tf: Exempt zeroed PTEs from inversion (bsc#1110006).\n- x86/speculation/l1tf: Extend 64bit swap file size limit (bsc#1110006).\n- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bsc#1105536).\n- x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bsc#1105536).\n- x86/speculation/l1tf: Fix up pte->pfn conversion for PAE (bsc#1110006).\n- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bsc#1105536).\n- x86/speculation/l1tf: Invert all not present mappings (bsc#1110006).\n- x86/speculation/l1tf: Make pmd/pud_mknotpresent() invert (bsc#1110006).\n- x86/speculation/l1tf: Protect PAE swap entries against L1TF (bsc#1110006).\n- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bsc#1105536).\n- x86/speculation: Simplify sysfs report of VMX L1TF vulnerability (bsc#1110006).\n- x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry (bsc#1106369).\n- x86/time: Correct the attribute on jiffies' definition (bsc#1110006).\n- x86/topology: Update the 'cpu cores' field in /proc/cpuinfo correctly across CPU hotplug operations (bsc#1110006).\n- x86/tsc: Add missing header to tsc_msr.c (bsc#1110006).\n- x86/tsc: Allow TSC calibration without PIT (bsc#1110006).\n- x86/tsc: Prevent 32bit truncation in calc_hpet_ref() (bsc#1110006).\n- x86/vdso: Fix asm constraints on vDSO syscall fallbacks (bsc#1110006).\n- x86/vdso: Fix lsl operand order (bsc#1110006).\n- x86/vdso: Fix lsl operand order (bsc#1110301).\n- x86/vdso: Fix vDSO syscall fallback asm constraint regression (bsc#1110006).\n- x86/xen/efi: Initialize only the EFI struct members used by Xen (bsc#1107945).\n- x86/xen: Add call of speculative_store_bypass_ht_init() to PV paths (bsc#1065600).\n- x86/xen: Delay get_cpu_cap until stack canary is established (bsc#1110006).\n- x86/xen: Drop 5-level paging support code from the XEN_PV code (bsc#1110006).\n- x86/xen: Reset VCPU0 info pointer after shared_info remap (bsc#1110006).\n- x86/xen: do not write ptes directly in 32-bit PV guests (bsc#1110006).\n- x86: Add check for APIC access address for vmentry of L2 guests (bsc#1110006).\n- x86: Call fixup_exception() before notify_die() in math_error() (bsc#1110006).\n- x86: Delay skip of emulated hypercall instruction (bsc#1107207).\n- x86: Delay skip of emulated hypercall instruction (bsc#1110006).\n- x86: PM: Make APM idle driver initialize polling state (bsc#1110006).\n- x86: i8259: Add missing include file (bsc#1110006).\n- x86: irq_remapping: Move irq remapping mode enum ().\n- x86: kvm: avoid unused variable warning (bsc#1110006).\n- x86: msr-index.h: Correct SNB_C1/C3_AUTO_UNDEMOTE defines (bsc#1110006).\n- x86: msr-index.h: Correct SNB_C1/C3_AUTO_UNDEMOTE defines (bsc#1110301).\n- xen-netfront: fix bug concerning replacement of MAX_SKB_FRAGS with XEN_NETIF_NR_SLOTS_MIN (bsc#1104824).\n- xen-netfront: fix queue name setting (bsc#1065600).\n- xen-netfront: fix warn message as irq device name has '/' (bsc#1065600).\n- xen-swiotlb: fix the check condition for xen_swiotlb_free_coherent (bsc#1065600).\n- xen/PVH: Set up GS segment for stack canary (bsc#1110006).\n- xen/blkback: do not keep persistent grants too long (bsc#1085042).\n- xen/blkback: move persistent grants flags to bool (bsc#1085042).\n- xen/blkback: remove unused pers_gnts_lock from struct (bsc#1085042).\n- xen/blkfront: cleanup stale persistent grants (bsc#1085042).\n- xen/blkfront: reorder tests in xlblk_init() (bsc#1085042).\n- xen/gntdev: avoid out of bounds access in case of partial gntdev_mmap() (bsc#1065600).\n- xen/x86/vpmu: Zero struct pt_regs before calling into sample handling code (bsc#1110006).\n- xen: Fix {set,clear}_foreign_p2m_mapping on autotranslating guests (bsc#1110006).\n- xen: Remove unnecessary BUG_ON from __unbind_from_irq() (bsc#1065600).\n- xen: avoid crash in disable_hotplug_cpu (bsc#1106594).\n- xen: issue warning message when out of grant maptrack entries (bsc#1105795).\n- xen: xenbus_dev_frontend: Fix XS_TRANSACTION_END handling (bsc#1065600).\n- xen: xenbus_dev_frontend: Really return response string (bsc#1065600).\n- xenbus: track caller request id (bsc#1065600).\n- xfrm: use complete IPv6 addresses for hash (bsc#1109330).\n- xfs, dax: introduce xfs_dax_aops (bsc#1104888).\n- xfs: Fix per-inode DAX flag inheritance (Git-fixes bsc#1109511).\n- xfs: Remove dead code from inode recover function (bsc#1105396).\n- xfs: add a new xfs_iext_lookup_extent_before helper (bsc#1095344).\n- xfs: add a xfs_bmap_fork_to_state helper (bsc#1095344).\n- xfs: add a xfs_iext_update_extent helper (bsc#1095344).\n- xfs: add asserts for the mmap lock in xfs_{insert,collapse}_file_space (bsc#1095344).\n- xfs: add comments documenting the rebalance algorithm (bsc#1095344).\n- xfs: add some comments to xfs_iext_insert/xfs_iext_insert_node (bsc#1095344).\n- xfs: allow unaligned extent records in xfs_bmbt_disk_set_all (bsc#1095344).\n- xfs: do not create overlapping extents in xfs_bmap_add_extent_delay_real (bsc#1095344).\n- xfs: do not fail when converting shortform attr to long form during ATTR_REPLACE (bsc#1105025).\n- xfs: do not rely on extent indices in xfs_bmap_collapse_extents (bsc#1095344).\n- xfs: do not rely on extent indices in xfs_bmap_insert_extents (bsc#1095344).\n- xfs: do not set XFS_BTCUR_BPRV_WASDEL in xfs_bunmapi (bsc#1095344).\n- xfs: fix memory leak in xfs_iext_free_last_leaf (bsc#1095344).\n- xfs: fix number of records handling in xfs_iext_split_leaf (bsc#1095344).\n- xfs: fix type usage (bsc#1095344).\n- xfs: handle zero entries case in xfs_iext_rebalance_leaf (bsc#1095344).\n- xfs: inline xfs_shift_file_space into callers (bsc#1095344).\n- xfs: introduce the xfs_iext_cursor abstraction (bsc#1095344).\n- xfs: iterate backwards in xfs_reflink_cancel_cow_blocks (bsc#1095344).\n- xfs: iterate over extents in xfs_bmap_extents_to_btree (bsc#1095344).\n- xfs: iterate over extents in xfs_iextents_copy (bsc#1095344).\n- xfs: make better use of the 'state' variable in xfs_bmap_del_extent_real (bsc#1095344).\n- xfs: merge xfs_bmap_read_extents into xfs_iread_extents (bsc#1095344).\n- xfs: move pre/post-bmap tracing into xfs_iext_update_extent (bsc#1095344).\n- xfs: move some code around inside xfs_bmap_shift_extents (bsc#1095344).\n- xfs: move some more code into xfs_bmap_del_extent_real (bsc#1095344).\n- xfs: move xfs_bmbt_irec and xfs_exntst_t to xfs_types.h (bsc#1095344).\n- xfs: move xfs_iext_insert tracepoint to report useful information (bsc#1095344).\n- xfs: pass a struct xfs_bmbt_irec to xfs_bmbt_lookup_eq (bsc#1095344).\n- xfs: pass a struct xfs_bmbt_irec to xfs_bmbt_update (bsc#1095344).\n- xfs: pass an on-disk extent to xfs_bmbt_validate_extent (bsc#1095344).\n- xfs: pass struct xfs_bmbt_irec to xfs_bmbt_validate_extent (bsc#1095344).\n- xfs: preserve i_rdev when recycling a reclaimable inode (bsc#1095344).\n- xfs: refactor delalloc accounting in xfs_bmap_add_extent_delay_real (bsc#1095344).\n- xfs: refactor dir2 leaf readahead shadow buffer cleverness (bsc#1095344).\n- xfs: refactor xfs_bmap_add_extent_delay_real (bsc#1095344).\n- xfs: refactor xfs_bmap_add_extent_hole_delay (bsc#1095344).\n- xfs: refactor xfs_bmap_add_extent_hole_real (bsc#1095344).\n- xfs: refactor xfs_bmap_add_extent_unwritten_real (bsc#1095344).\n- xfs: refactor xfs_del_extent_real (bsc#1095344).\n- xfs: remove XFS_BMAP_MAX_SHIFT_EXTENTS (bsc#1095344).\n- xfs: remove XFS_BMAP_TRACE_EXLIST (bsc#1095344).\n- xfs: remove a duplicate assignment in xfs_bmap_add_extent_delay_real (bsc#1095344).\n- xfs: remove a superflous assignment in xfs_iext_remove_node (bsc#1095344).\n- xfs: remove all xfs_bmbt_set_* helpers except for xfs_bmbt_set_all (bsc#1095344).\n- xfs: remove if_rdev (bsc#1095344).\n- xfs: remove post-bmap tracing in xfs_bmap_local_to_extents (bsc#1095344).\n- xfs: remove support for inlining data/extents into the inode fork (bsc#1095344).\n- xfs: remove the never fully implemented UUID fork format (bsc#1095344).\n- xfs: remove the nr_extents argument to xfs_iext_insert (bsc#1095344).\n- xfs: remove the nr_extents argument to xfs_iext_remove (bsc#1095344).\n- xfs: remove xfs_bmbt_get_state (bsc#1095344).\n- xfs: remove xfs_bmse_shift_one (bsc#1095344).\n- xfs: rename bno to end in __xfs_bunmapi (bsc#1095344).\n- xfs: repair malformed inode items during log recovery (bsc#1105396).\n- xfs: replace xfs_bmbt_lookup_ge with xfs_bmbt_lookup_first (bsc#1095344).\n- xfs: replace xfs_qm_get_rtblks with a direct call to xfs_bmap_count_leaves (bsc#1095344).\n- xfs: rewrite getbmap using the xfs_iext_* helpers (bsc#1095344).\n- xfs: rewrite xfs_bmap_count_leaves using xfs_iext_get_extent (bsc#1095344).\n- xfs: rewrite xfs_bmap_first_unused to make better use of xfs_iext_get_extent (bsc#1095344).\n- xfs: simplify the xfs_getbmap interface (bsc#1095344).\n- xfs: simplify xfs_reflink_convert_cow (bsc#1095344).\n- xfs: split xfs_bmap_shift_extents (bsc#1095344).\n- xfs: switch xfs_bmap_local_to_extents to use xfs_iext_insert (bsc#1095344).\n- xfs: treat idx as a cursor in xfs_bmap_add_extent_delay_real (bsc#1095344).\n- xfs: treat idx as a cursor in xfs_bmap_add_extent_hole_delay (bsc#1095344).\n- xfs: treat idx as a cursor in xfs_bmap_add_extent_hole_real (bsc#1095344).\n- xfs: treat idx as a cursor in xfs_bmap_add_extent_unwritten_real (bsc#1095344).\n- xfs: treat idx as a cursor in xfs_bmap_collapse_extents (bsc#1095344).\n- xfs: treat idx as a cursor in xfs_bmap_del_extent_* (bsc#1095344).\n- xfs: trivial indentation fixup for xfs_iext_remove_node (bsc#1095344).\n- xfs: update got in xfs_bmap_shift_update_extent (bsc#1095344).\n- xfs: use a b+tree for the in-core extent list (bsc#1095344).\n- xfs: use correct state defines in xfs_bmap_del_extent_{cow,delay} (bsc#1095344).\n- xfs: use the state defines in xfs_bmap_del_extent_real (bsc#1095344).\n- xfs: use xfs_bmap_del_extent_delay for the data fork as well (bsc#1095344).\n- xfs: use xfs_iext_*_extent helpers in xfs_bmap_shift_extents (bsc#1095344).\n- xfs: use xfs_iext_*_extent helpers in xfs_bmap_split_extent_at (bsc#1095344).\n- xfs: use xfs_iext_get_extent in xfs_bmap_first_unused (bsc#1095344).\n- xfs: use xfs_iext_get_extent instead of open coding it (bsc#1095344).\n- xhci: Add missing CAS workaround for Intel Sunrise Point xHCI (bsc#1051510).\n- xhci: Do not print a warning when setting link state for disabled ports (bsc#1051510).\n- xhci: Fix use after free for URB cancellation on a reallocated endpoint (bsc#1051510).\n- zram: fix null dereference of handle (bsc#1105355).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-Module-Public-Cloud-15-2018-2819", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3961-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:3961-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183961-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:3961-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html", }, { category: "self", summary: "SUSE Bug 1012382", url: "https://bugzilla.suse.com/1012382", }, { category: "self", summary: "SUSE Bug 1031392", url: "https://bugzilla.suse.com/1031392", }, { category: "self", summary: "SUSE Bug 1043912", url: "https://bugzilla.suse.com/1043912", }, { category: "self", summary: "SUSE Bug 1044189", url: "https://bugzilla.suse.com/1044189", }, { category: "self", summary: "SUSE Bug 1046302", url: "https://bugzilla.suse.com/1046302", }, { category: "self", summary: "SUSE Bug 1046305", url: "https://bugzilla.suse.com/1046305", }, { category: "self", summary: "SUSE Bug 1046306", url: "https://bugzilla.suse.com/1046306", }, { category: "self", summary: "SUSE Bug 1046307", url: "https://bugzilla.suse.com/1046307", }, { category: "self", summary: "SUSE Bug 1046540", url: "https://bugzilla.suse.com/1046540", }, { category: "self", summary: "SUSE Bug 1046543", url: "https://bugzilla.suse.com/1046543", }, { category: "self", summary: "SUSE Bug 1050244", url: "https://bugzilla.suse.com/1050244", }, { category: "self", summary: "SUSE Bug 1050319", url: "https://bugzilla.suse.com/1050319", }, { category: "self", summary: "SUSE Bug 1050536", url: "https://bugzilla.suse.com/1050536", }, { category: "self", summary: "SUSE Bug 1050540", url: "https://bugzilla.suse.com/1050540", }, { category: "self", summary: "SUSE Bug 1051510", url: "https://bugzilla.suse.com/1051510", }, { category: "self", summary: "SUSE Bug 1054914", url: "https://bugzilla.suse.com/1054914", }, { category: "self", summary: "SUSE Bug 1055014", url: "https://bugzilla.suse.com/1055014", }, { category: "self", summary: "SUSE Bug 1055117", url: "https://bugzilla.suse.com/1055117", }, { category: "self", summary: "SUSE Bug 1055120", url: "https://bugzilla.suse.com/1055120", }, { category: "self", summary: "SUSE Bug 1058659", url: "https://bugzilla.suse.com/1058659", }, { category: "self", summary: "SUSE Bug 1060463", url: "https://bugzilla.suse.com/1060463", }, { category: "self", summary: "SUSE Bug 1061840", url: "https://bugzilla.suse.com/1061840", }, { category: "self", summary: "SUSE Bug 1065600", url: "https://bugzilla.suse.com/1065600", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1066674", url: "https://bugzilla.suse.com/1066674", }, { category: "self", summary: "SUSE Bug 1067126", url: "https://bugzilla.suse.com/1067126", }, { category: "self", summary: "SUSE Bug 1067906", url: "https://bugzilla.suse.com/1067906", }, { category: "self", summary: "SUSE Bug 1068032", url: "https://bugzilla.suse.com/1068032", }, { category: "self", summary: "SUSE Bug 1069138", url: "https://bugzilla.suse.com/1069138", }, { category: "self", summary: "SUSE Bug 1071995", url: "https://bugzilla.suse.com/1071995", }, { category: "self", summary: "SUSE Bug 1076830", url: "https://bugzilla.suse.com/1076830", }, { category: "self", summary: "SUSE Bug 1077761", url: "https://bugzilla.suse.com/1077761", }, { category: "self", summary: "SUSE Bug 1077989", url: "https://bugzilla.suse.com/1077989", }, { category: "self", summary: "SUSE Bug 1078720", url: "https://bugzilla.suse.com/1078720", }, { category: "self", summary: "SUSE Bug 1079524", url: "https://bugzilla.suse.com/1079524", }, { category: "self", summary: "SUSE Bug 1080157", url: "https://bugzilla.suse.com/1080157", }, { category: "self", summary: "SUSE Bug 1082519", url: "https://bugzilla.suse.com/1082519", }, { category: "self", summary: "SUSE Bug 1082555", url: "https://bugzilla.suse.com/1082555", }, { category: "self", summary: "SUSE Bug 1083647", url: "https://bugzilla.suse.com/1083647", }, { category: "self", summary: "SUSE Bug 1083663", url: "https://bugzilla.suse.com/1083663", }, { category: "self", summary: "SUSE Bug 1084760", url: "https://bugzilla.suse.com/1084760", }, { category: "self", summary: "SUSE Bug 1084831", url: "https://bugzilla.suse.com/1084831", }, { category: "self", summary: "SUSE Bug 1085030", url: "https://bugzilla.suse.com/1085030", }, { category: "self", summary: "SUSE Bug 1085042", url: "https://bugzilla.suse.com/1085042", }, { category: "self", summary: "SUSE Bug 1085262", url: "https://bugzilla.suse.com/1085262", }, { category: "self", summary: "SUSE Bug 1086282", url: "https://bugzilla.suse.com/1086282", }, { category: "self", summary: "SUSE Bug 1086283", url: "https://bugzilla.suse.com/1086283", }, { category: "self", summary: "SUSE Bug 1086288", url: "https://bugzilla.suse.com/1086288", }, { category: "self", summary: "SUSE Bug 1086327", url: "https://bugzilla.suse.com/1086327", }, { category: "self", summary: "SUSE Bug 1089663", url: "https://bugzilla.suse.com/1089663", }, { category: "self", summary: "SUSE Bug 1090078", url: "https://bugzilla.suse.com/1090078", }, { category: "self", summary: "SUSE Bug 1091800", url: "https://bugzilla.suse.com/1091800", }, { category: "self", summary: "SUSE Bug 1092903", url: "https://bugzilla.suse.com/1092903", }, { category: "self", summary: "SUSE Bug 1094244", url: "https://bugzilla.suse.com/1094244", }, { category: "self", summary: "SUSE Bug 1094825", url: "https://bugzilla.suse.com/1094825", }, { category: "self", summary: "SUSE Bug 1095344", url: "https://bugzilla.suse.com/1095344", }, { category: "self", summary: "SUSE Bug 1095805", url: "https://bugzilla.suse.com/1095805", }, { category: "self", summary: "SUSE Bug 1096748", url: "https://bugzilla.suse.com/1096748", }, { category: "self", summary: "SUSE Bug 1097105", url: "https://bugzilla.suse.com/1097105", }, { category: "self", summary: "SUSE Bug 1097583", url: "https://bugzilla.suse.com/1097583", }, { category: "self", summary: "SUSE Bug 1097584", url: "https://bugzilla.suse.com/1097584", }, { category: "self", summary: "SUSE Bug 1097585", url: "https://bugzilla.suse.com/1097585", }, { category: "self", summary: "SUSE Bug 1097586", url: "https://bugzilla.suse.com/1097586", }, { category: "self", summary: "SUSE Bug 1097587", url: "https://bugzilla.suse.com/1097587", }, { category: "self", summary: "SUSE Bug 1097588", url: "https://bugzilla.suse.com/1097588", }, { category: "self", summary: "SUSE Bug 1098459", url: "https://bugzilla.suse.com/1098459", }, { category: "self", summary: "SUSE Bug 1098782", url: "https://bugzilla.suse.com/1098782", }, { category: "self", summary: "SUSE Bug 1098822", url: "https://bugzilla.suse.com/1098822", }, { category: "self", summary: "SUSE Bug 1099125", url: "https://bugzilla.suse.com/1099125", }, { category: "self", summary: "SUSE Bug 1099922", url: "https://bugzilla.suse.com/1099922", }, { category: "self", summary: "SUSE Bug 1099999", url: "https://bugzilla.suse.com/1099999", }, { category: "self", summary: "SUSE Bug 1100001", url: "https://bugzilla.suse.com/1100001", }, { category: "self", summary: "SUSE Bug 1100132", url: "https://bugzilla.suse.com/1100132", }, { category: "self", summary: "SUSE Bug 1101480", url: "https://bugzilla.suse.com/1101480", }, { category: "self", summary: "SUSE Bug 1101557", url: "https://bugzilla.suse.com/1101557", }, { category: "self", summary: "SUSE Bug 1101669", url: "https://bugzilla.suse.com/1101669", }, { category: "self", summary: "SUSE Bug 1102346", url: "https://bugzilla.suse.com/1102346", }, { category: "self", summary: "SUSE Bug 1102495", url: "https://bugzilla.suse.com/1102495", }, { category: "self", summary: "SUSE Bug 1102517", url: "https://bugzilla.suse.com/1102517", }, { category: "self", summary: "SUSE Bug 1102715", url: "https://bugzilla.suse.com/1102715", }, { category: "self", summary: "SUSE Bug 1102870", url: "https://bugzilla.suse.com/1102870", }, { category: "self", summary: "SUSE Bug 1102875", url: "https://bugzilla.suse.com/1102875", }, { category: "self", summary: "SUSE Bug 1102877", url: "https://bugzilla.suse.com/1102877", }, { category: "self", summary: "SUSE Bug 1102879", url: "https://bugzilla.suse.com/1102879", }, { category: "self", summary: "SUSE Bug 1102881", url: "https://bugzilla.suse.com/1102881", }, { category: "self", summary: "SUSE Bug 1102882", url: "https://bugzilla.suse.com/1102882", }, { category: "self", summary: "SUSE Bug 1102896", url: "https://bugzilla.suse.com/1102896", }, { category: "self", summary: "SUSE Bug 1103269", url: "https://bugzilla.suse.com/1103269", }, { category: "self", summary: "SUSE Bug 1103308", url: "https://bugzilla.suse.com/1103308", }, { category: "self", summary: "SUSE Bug 1103356", url: "https://bugzilla.suse.com/1103356", }, { category: "self", summary: "SUSE Bug 1103363", url: "https://bugzilla.suse.com/1103363", }, { category: "self", summary: "SUSE Bug 1103387", url: "https://bugzilla.suse.com/1103387", }, { category: "self", summary: "SUSE Bug 1103405", url: "https://bugzilla.suse.com/1103405", }, { category: "self", summary: "SUSE Bug 1103421", url: "https://bugzilla.suse.com/1103421", }, { category: "self", summary: "SUSE Bug 1103543", url: "https://bugzilla.suse.com/1103543", }, { category: "self", summary: "SUSE Bug 1103587", url: "https://bugzilla.suse.com/1103587", }, { category: "self", summary: "SUSE Bug 1103636", url: "https://bugzilla.suse.com/1103636", }, { category: "self", summary: "SUSE Bug 1103948", url: "https://bugzilla.suse.com/1103948", }, { category: "self", summary: "SUSE Bug 1103949", url: "https://bugzilla.suse.com/1103949", }, { category: "self", summary: "SUSE Bug 1103961", url: "https://bugzilla.suse.com/1103961", }, { category: "self", summary: "SUSE Bug 1104172", url: "https://bugzilla.suse.com/1104172", }, { category: "self", summary: "SUSE Bug 1104353", url: "https://bugzilla.suse.com/1104353", }, { category: "self", summary: "SUSE Bug 1104482", url: "https://bugzilla.suse.com/1104482", }, { category: "self", summary: "SUSE Bug 1104683", url: "https://bugzilla.suse.com/1104683", }, { category: "self", summary: "SUSE Bug 1104731", url: "https://bugzilla.suse.com/1104731", }, { category: "self", summary: "SUSE Bug 1104824", url: "https://bugzilla.suse.com/1104824", }, { category: "self", summary: "SUSE Bug 1104888", url: "https://bugzilla.suse.com/1104888", }, { category: "self", summary: "SUSE Bug 1104890", url: "https://bugzilla.suse.com/1104890", }, { category: "self", summary: "SUSE Bug 1105025", url: "https://bugzilla.suse.com/1105025", }, { category: "self", summary: "SUSE Bug 1105190", url: "https://bugzilla.suse.com/1105190", }, { category: "self", summary: "SUSE Bug 1105247", url: "https://bugzilla.suse.com/1105247", }, { category: "self", summary: "SUSE Bug 1105292", url: "https://bugzilla.suse.com/1105292", }, { category: "self", summary: "SUSE Bug 1105322", url: "https://bugzilla.suse.com/1105322", }, { category: "self", summary: "SUSE Bug 1105355", url: "https://bugzilla.suse.com/1105355", }, { category: "self", summary: "SUSE Bug 1105378", url: "https://bugzilla.suse.com/1105378", }, { category: "self", summary: "SUSE Bug 1105396", url: "https://bugzilla.suse.com/1105396", }, { category: "self", summary: "SUSE Bug 1105428", url: "https://bugzilla.suse.com/1105428", }, { category: "self", summary: "SUSE Bug 1105467", url: "https://bugzilla.suse.com/1105467", }, { category: "self", summary: "SUSE Bug 1105524", url: "https://bugzilla.suse.com/1105524", }, { category: "self", summary: "SUSE Bug 1105536", url: "https://bugzilla.suse.com/1105536", }, { category: "self", summary: "SUSE Bug 1105597", url: "https://bugzilla.suse.com/1105597", }, { category: "self", summary: "SUSE Bug 1105603", url: "https://bugzilla.suse.com/1105603", }, { category: "self", summary: "SUSE Bug 1105672", url: "https://bugzilla.suse.com/1105672", }, { category: "self", summary: "SUSE Bug 1105731", url: "https://bugzilla.suse.com/1105731", }, { category: "self", summary: "SUSE Bug 1105795", url: "https://bugzilla.suse.com/1105795", }, { category: "self", summary: "SUSE Bug 1105907", url: "https://bugzilla.suse.com/1105907", }, { category: "self", summary: "SUSE Bug 1106007", url: "https://bugzilla.suse.com/1106007", }, { category: "self", summary: "SUSE Bug 1106016", url: "https://bugzilla.suse.com/1106016", }, { category: "self", summary: "SUSE Bug 1106105", url: "https://bugzilla.suse.com/1106105", }, { category: "self", summary: "SUSE Bug 1106110", url: "https://bugzilla.suse.com/1106110", }, { category: "self", summary: "SUSE Bug 1106121", url: "https://bugzilla.suse.com/1106121", }, { category: "self", summary: "SUSE Bug 1106170", url: "https://bugzilla.suse.com/1106170", }, { category: "self", summary: "SUSE Bug 1106178", url: "https://bugzilla.suse.com/1106178", }, { category: "self", summary: "SUSE Bug 1106229", url: "https://bugzilla.suse.com/1106229", }, { category: "self", summary: "SUSE Bug 1106230", url: "https://bugzilla.suse.com/1106230", }, { category: "self", summary: "SUSE Bug 1106231", url: "https://bugzilla.suse.com/1106231", }, { category: "self", summary: "SUSE Bug 1106233", url: "https://bugzilla.suse.com/1106233", }, { category: "self", summary: "SUSE Bug 1106235", url: "https://bugzilla.suse.com/1106235", }, { category: "self", summary: "SUSE Bug 1106236", url: "https://bugzilla.suse.com/1106236", }, { category: "self", summary: "SUSE Bug 1106237", url: "https://bugzilla.suse.com/1106237", }, { category: "self", summary: "SUSE Bug 1106238", url: "https://bugzilla.suse.com/1106238", }, { category: "self", summary: "SUSE Bug 1106240", url: "https://bugzilla.suse.com/1106240", }, { category: "self", summary: "SUSE Bug 1106291", url: "https://bugzilla.suse.com/1106291", }, { category: "self", summary: "SUSE Bug 1106297", url: "https://bugzilla.suse.com/1106297", }, { category: "self", summary: "SUSE Bug 1106333", url: "https://bugzilla.suse.com/1106333", }, { category: "self", summary: "SUSE Bug 1106369", url: "https://bugzilla.suse.com/1106369", }, { category: "self", summary: "SUSE Bug 1106427", url: "https://bugzilla.suse.com/1106427", }, { category: "self", summary: "SUSE Bug 1106464", url: "https://bugzilla.suse.com/1106464", }, { category: "self", summary: "SUSE Bug 1106509", url: "https://bugzilla.suse.com/1106509", }, { category: "self", summary: "SUSE Bug 1106511", url: "https://bugzilla.suse.com/1106511", }, { category: "self", summary: "SUSE Bug 1106594", url: "https://bugzilla.suse.com/1106594", }, { category: "self", summary: "SUSE Bug 1106636", url: "https://bugzilla.suse.com/1106636", }, { category: "self", summary: "SUSE Bug 1106688", url: "https://bugzilla.suse.com/1106688", }, { category: "self", summary: "SUSE Bug 1106697", url: "https://bugzilla.suse.com/1106697", }, { category: "self", summary: "SUSE Bug 1106779", url: "https://bugzilla.suse.com/1106779", }, { category: "self", summary: "SUSE Bug 1106800", url: "https://bugzilla.suse.com/1106800", }, { category: "self", summary: "SUSE Bug 1106838", url: "https://bugzilla.suse.com/1106838", }, { category: "self", summary: "SUSE Bug 1106890", url: "https://bugzilla.suse.com/1106890", }, { category: "self", summary: "SUSE Bug 1106891", url: "https://bugzilla.suse.com/1106891", }, { category: "self", summary: "SUSE Bug 1106892", url: "https://bugzilla.suse.com/1106892", }, { category: "self", summary: "SUSE Bug 1106893", url: "https://bugzilla.suse.com/1106893", }, { category: "self", summary: "SUSE Bug 1106894", url: "https://bugzilla.suse.com/1106894", }, { category: "self", summary: "SUSE Bug 1106896", url: "https://bugzilla.suse.com/1106896", }, { category: "self", summary: "SUSE Bug 1106897", url: "https://bugzilla.suse.com/1106897", }, { category: "self", summary: "SUSE Bug 1106898", url: "https://bugzilla.suse.com/1106898", }, { category: "self", summary: "SUSE Bug 1106899", url: "https://bugzilla.suse.com/1106899", }, { category: "self", summary: "SUSE Bug 1106900", url: "https://bugzilla.suse.com/1106900", }, { category: "self", summary: "SUSE Bug 1106901", url: "https://bugzilla.suse.com/1106901", }, { category: "self", summary: "SUSE Bug 1106902", url: "https://bugzilla.suse.com/1106902", }, { category: "self", summary: "SUSE Bug 1106903", url: "https://bugzilla.suse.com/1106903", }, { category: "self", summary: "SUSE Bug 1106905", url: "https://bugzilla.suse.com/1106905", }, { category: "self", summary: "SUSE Bug 1106906", url: "https://bugzilla.suse.com/1106906", }, { category: "self", summary: "SUSE Bug 1106948", url: "https://bugzilla.suse.com/1106948", }, { category: "self", summary: "SUSE Bug 1106995", url: "https://bugzilla.suse.com/1106995", }, { category: "self", summary: "SUSE Bug 1107008", url: "https://bugzilla.suse.com/1107008", }, { category: "self", summary: "SUSE Bug 1107060", url: "https://bugzilla.suse.com/1107060", }, { category: "self", summary: "SUSE Bug 1107061", url: "https://bugzilla.suse.com/1107061", }, { category: "self", summary: "SUSE Bug 1107065", url: "https://bugzilla.suse.com/1107065", }, { category: "self", summary: "SUSE Bug 1107074", url: "https://bugzilla.suse.com/1107074", }, { category: "self", summary: "SUSE Bug 1107207", url: "https://bugzilla.suse.com/1107207", }, { category: "self", summary: "SUSE Bug 1107319", url: "https://bugzilla.suse.com/1107319", }, { category: "self", summary: "SUSE Bug 1107320", url: "https://bugzilla.suse.com/1107320", }, { category: "self", summary: "SUSE Bug 1107522", url: "https://bugzilla.suse.com/1107522", }, { category: "self", summary: "SUSE Bug 1107535", url: "https://bugzilla.suse.com/1107535", }, { category: "self", summary: "SUSE Bug 1107685", url: "https://bugzilla.suse.com/1107685", }, { category: "self", summary: "SUSE Bug 1107689", url: "https://bugzilla.suse.com/1107689", }, { category: "self", summary: "SUSE Bug 1107735", url: "https://bugzilla.suse.com/1107735", }, { category: "self", summary: "SUSE Bug 1107756", url: "https://bugzilla.suse.com/1107756", }, { category: "self", summary: "SUSE Bug 1107783", url: "https://bugzilla.suse.com/1107783", }, { category: "self", summary: "SUSE Bug 1107829", url: "https://bugzilla.suse.com/1107829", }, { category: "self", summary: "SUSE Bug 1107870", url: "https://bugzilla.suse.com/1107870", }, { category: "self", summary: "SUSE Bug 1107924", url: "https://bugzilla.suse.com/1107924", }, { category: "self", summary: "SUSE Bug 1107928", url: "https://bugzilla.suse.com/1107928", }, { category: "self", summary: "SUSE Bug 1107945", url: "https://bugzilla.suse.com/1107945", }, { category: "self", summary: "SUSE Bug 1107947", url: "https://bugzilla.suse.com/1107947", }, { category: "self", summary: "SUSE Bug 1107966", url: "https://bugzilla.suse.com/1107966", }, { category: "self", summary: "SUSE Bug 1108010", url: "https://bugzilla.suse.com/1108010", }, { category: "self", summary: "SUSE Bug 1108093", url: "https://bugzilla.suse.com/1108093", }, { category: "self", summary: "SUSE Bug 1108096", url: "https://bugzilla.suse.com/1108096", }, { category: "self", summary: "SUSE Bug 1108170", url: "https://bugzilla.suse.com/1108170", }, { category: "self", summary: "SUSE Bug 1108241", url: "https://bugzilla.suse.com/1108241", }, { category: "self", summary: "SUSE Bug 1108243", url: "https://bugzilla.suse.com/1108243", }, { category: "self", summary: "SUSE Bug 1108260", url: "https://bugzilla.suse.com/1108260", }, { category: "self", summary: "SUSE Bug 1108281", url: "https://bugzilla.suse.com/1108281", }, { category: "self", summary: "SUSE Bug 1108323", url: "https://bugzilla.suse.com/1108323", }, { category: "self", summary: "SUSE Bug 1108377", url: "https://bugzilla.suse.com/1108377", }, { category: "self", summary: "SUSE Bug 1108399", url: "https://bugzilla.suse.com/1108399", }, { category: "self", summary: "SUSE Bug 1108468", url: "https://bugzilla.suse.com/1108468", }, { category: "self", summary: "SUSE Bug 1108520", url: "https://bugzilla.suse.com/1108520", }, { category: "self", summary: "SUSE Bug 1108823", url: "https://bugzilla.suse.com/1108823", }, { category: "self", summary: "SUSE Bug 1108841", url: "https://bugzilla.suse.com/1108841", }, { category: "self", summary: "SUSE Bug 1108870", url: "https://bugzilla.suse.com/1108870", }, { category: "self", summary: "SUSE Bug 1109151", url: "https://bugzilla.suse.com/1109151", }, { category: "self", summary: "SUSE Bug 1109158", url: "https://bugzilla.suse.com/1109158", }, { category: "self", summary: "SUSE Bug 1109217", url: "https://bugzilla.suse.com/1109217", }, { category: "self", summary: "SUSE Bug 1109244", url: "https://bugzilla.suse.com/1109244", }, { category: "self", summary: "SUSE Bug 1109269", url: "https://bugzilla.suse.com/1109269", }, { category: "self", summary: "SUSE Bug 1109330", url: "https://bugzilla.suse.com/1109330", }, { category: "self", summary: "SUSE Bug 1109333", url: "https://bugzilla.suse.com/1109333", }, { category: "self", summary: "SUSE Bug 1109336", url: "https://bugzilla.suse.com/1109336", }, { category: "self", summary: "SUSE Bug 1109337", url: "https://bugzilla.suse.com/1109337", }, { category: "self", summary: "SUSE Bug 1109511", url: "https://bugzilla.suse.com/1109511", }, { category: "self", summary: "SUSE Bug 1109603", url: "https://bugzilla.suse.com/1109603", }, { category: "self", summary: "SUSE Bug 1109739", url: "https://bugzilla.suse.com/1109739", }, { category: "self", summary: "SUSE Bug 1109772", url: "https://bugzilla.suse.com/1109772", }, { category: "self", summary: "SUSE Bug 1109784", url: "https://bugzilla.suse.com/1109784", }, { category: "self", summary: "SUSE Bug 1109806", url: "https://bugzilla.suse.com/1109806", }, { category: "self", summary: "SUSE Bug 1109818", url: "https://bugzilla.suse.com/1109818", }, { category: "self", summary: "SUSE Bug 1109907", url: "https://bugzilla.suse.com/1109907", }, { category: "self", summary: "SUSE Bug 1109915", url: "https://bugzilla.suse.com/1109915", }, { category: "self", summary: "SUSE Bug 1109919", url: "https://bugzilla.suse.com/1109919", }, { category: "self", summary: "SUSE Bug 1109951", url: "https://bugzilla.suse.com/1109951", }, { category: "self", summary: "SUSE Bug 1109979", url: "https://bugzilla.suse.com/1109979", }, { category: "self", summary: "SUSE Bug 1109992", url: "https://bugzilla.suse.com/1109992", }, { category: "self", summary: "SUSE Bug 1110006", url: "https://bugzilla.suse.com/1110006", }, { category: "self", summary: "SUSE Bug 1110096", url: "https://bugzilla.suse.com/1110096", }, { category: "self", summary: "SUSE Bug 1110301", url: "https://bugzilla.suse.com/1110301", }, { category: "self", summary: "SUSE Bug 1110363", url: "https://bugzilla.suse.com/1110363", }, { category: "self", summary: "SUSE Bug 1110538", url: "https://bugzilla.suse.com/1110538", }, { category: "self", summary: "SUSE Bug 1110561", url: "https://bugzilla.suse.com/1110561", }, { category: "self", summary: "SUSE Bug 1110639", url: "https://bugzilla.suse.com/1110639", }, { category: "self", summary: "SUSE Bug 1110642", url: "https://bugzilla.suse.com/1110642", }, { category: "self", summary: "SUSE Bug 1110643", url: "https://bugzilla.suse.com/1110643", }, { category: "self", summary: "SUSE Bug 1110644", url: "https://bugzilla.suse.com/1110644", }, { category: "self", summary: "SUSE Bug 1110645", url: "https://bugzilla.suse.com/1110645", }, { category: "self", summary: "SUSE Bug 1110646", url: "https://bugzilla.suse.com/1110646", }, { category: "self", summary: "SUSE Bug 1110647", url: "https://bugzilla.suse.com/1110647", }, { category: "self", summary: "SUSE Bug 1110649", url: "https://bugzilla.suse.com/1110649", }, { category: "self", summary: "SUSE Bug 1110650", url: "https://bugzilla.suse.com/1110650", }, { category: "self", summary: "SUSE Bug 1111028", url: "https://bugzilla.suse.com/1111028", }, { category: "self", summary: "SUSE Bug 1111040", url: "https://bugzilla.suse.com/1111040", }, { category: "self", summary: "SUSE Bug 1111076", url: "https://bugzilla.suse.com/1111076", }, { category: "self", summary: "SUSE Bug 1111506", url: "https://bugzilla.suse.com/1111506", }, { category: "self", summary: "SUSE Bug 1111806", url: "https://bugzilla.suse.com/1111806", }, { category: "self", summary: "SUSE Bug 1111819", url: "https://bugzilla.suse.com/1111819", }, { category: "self", summary: "SUSE Bug 1111830", url: "https://bugzilla.suse.com/1111830", }, { category: "self", summary: "SUSE Bug 1111834", url: "https://bugzilla.suse.com/1111834", }, { category: "self", summary: "SUSE Bug 1111841", url: "https://bugzilla.suse.com/1111841", }, { category: "self", summary: "SUSE Bug 1111870", url: "https://bugzilla.suse.com/1111870", }, { category: "self", summary: "SUSE Bug 1111901", url: "https://bugzilla.suse.com/1111901", }, { category: "self", summary: "SUSE Bug 1111904", url: "https://bugzilla.suse.com/1111904", }, { category: "self", summary: "SUSE Bug 1111921", url: "https://bugzilla.suse.com/1111921", }, { category: "self", summary: "SUSE Bug 1111928", url: "https://bugzilla.suse.com/1111928", }, { category: "self", summary: "SUSE Bug 1111983", url: "https://bugzilla.suse.com/1111983", }, { category: "self", summary: "SUSE Bug 1112170", url: "https://bugzilla.suse.com/1112170", }, { category: "self", summary: "SUSE Bug 1112208", url: "https://bugzilla.suse.com/1112208", }, { category: "self", summary: "SUSE Bug 1112219", url: "https://bugzilla.suse.com/1112219", }, { category: "self", summary: "SUSE Bug 1112246", url: "https://bugzilla.suse.com/1112246", }, { category: "self", summary: "SUSE Bug 1112372", url: "https://bugzilla.suse.com/1112372", }, { category: "self", summary: "SUSE Bug 1112514", url: "https://bugzilla.suse.com/1112514", }, { category: "self", summary: "SUSE Bug 1112554", url: "https://bugzilla.suse.com/1112554", }, { category: "self", summary: "SUSE Bug 1112708", url: "https://bugzilla.suse.com/1112708", }, { category: "self", summary: "SUSE Bug 1112710", url: "https://bugzilla.suse.com/1112710", }, { category: "self", summary: "SUSE Bug 1112711", url: "https://bugzilla.suse.com/1112711", }, { category: "self", summary: "SUSE Bug 1112712", url: "https://bugzilla.suse.com/1112712", }, { category: "self", summary: "SUSE Bug 1112713", url: "https://bugzilla.suse.com/1112713", }, { category: "self", summary: "SUSE Bug 1112731", url: "https://bugzilla.suse.com/1112731", }, { category: "self", summary: "SUSE Bug 1112732", url: "https://bugzilla.suse.com/1112732", }, { category: "self", summary: "SUSE Bug 1112733", url: "https://bugzilla.suse.com/1112733", }, { category: "self", summary: "SUSE Bug 1112734", url: "https://bugzilla.suse.com/1112734", }, { category: "self", summary: "SUSE Bug 1112735", url: "https://bugzilla.suse.com/1112735", }, { category: "self", summary: "SUSE Bug 1112736", url: "https://bugzilla.suse.com/1112736", }, { category: "self", summary: "SUSE Bug 1112738", url: "https://bugzilla.suse.com/1112738", }, { category: "self", summary: "SUSE Bug 1112739", url: "https://bugzilla.suse.com/1112739", }, { category: "self", summary: "SUSE Bug 1112740", url: "https://bugzilla.suse.com/1112740", }, { category: "self", summary: "SUSE Bug 1112741", url: "https://bugzilla.suse.com/1112741", }, { category: "self", summary: "SUSE Bug 1112743", url: "https://bugzilla.suse.com/1112743", }, { category: "self", summary: "SUSE Bug 1112745", url: "https://bugzilla.suse.com/1112745", }, { category: "self", summary: "SUSE Bug 1112746", url: "https://bugzilla.suse.com/1112746", }, { category: "self", summary: "SUSE Bug 1112878", url: "https://bugzilla.suse.com/1112878", }, { category: "self", summary: "SUSE Bug 1112894", url: "https://bugzilla.suse.com/1112894", }, { category: "self", summary: "SUSE Bug 1112899", url: "https://bugzilla.suse.com/1112899", }, { category: "self", summary: "SUSE Bug 1112902", url: "https://bugzilla.suse.com/1112902", }, { category: "self", summary: "SUSE Bug 1112903", url: "https://bugzilla.suse.com/1112903", }, { category: "self", summary: "SUSE Bug 1112905", url: "https://bugzilla.suse.com/1112905", }, { category: "self", summary: "SUSE Bug 1112906", url: "https://bugzilla.suse.com/1112906", }, { category: "self", summary: "SUSE Bug 1112907", url: "https://bugzilla.suse.com/1112907", }, { category: "self", summary: "SUSE Bug 1113257", url: "https://bugzilla.suse.com/1113257", }, { category: "self", summary: "SUSE Bug 1113284", url: "https://bugzilla.suse.com/1113284", }, { category: "self", summary: "SUSE Bug 1113295", url: "https://bugzilla.suse.com/1113295", }, { category: "self", summary: "SUSE Bug 1113408", url: "https://bugzilla.suse.com/1113408", }, { category: "self", summary: "SUSE Bug 1113667", url: "https://bugzilla.suse.com/1113667", }, { category: "self", summary: "SUSE Bug 1113722", url: "https://bugzilla.suse.com/1113722", }, { category: "self", summary: "SUSE Bug 1113751", url: "https://bugzilla.suse.com/1113751", }, { category: "self", summary: "SUSE Bug 1113780", url: "https://bugzilla.suse.com/1113780", }, { category: "self", summary: "SUSE Bug 1113972", url: "https://bugzilla.suse.com/1113972", }, { category: "self", summary: "SUSE Bug 1114279", url: "https://bugzilla.suse.com/1114279", }, { category: "self", summary: "SUSE Bug 971975", url: "https://bugzilla.suse.com/971975", }, { category: "self", summary: "SUSE CVE CVE-2017-16533 page", url: "https://www.suse.com/security/cve/CVE-2017-16533/", }, { category: "self", summary: "SUSE CVE CVE-2017-18224 page", url: "https://www.suse.com/security/cve/CVE-2017-18224/", }, { category: "self", summary: "SUSE CVE CVE-2018-10902 page", url: "https://www.suse.com/security/cve/CVE-2018-10902/", }, { category: "self", summary: "SUSE CVE CVE-2018-10938 page", url: "https://www.suse.com/security/cve/CVE-2018-10938/", }, { category: "self", summary: "SUSE CVE CVE-2018-10940 page", url: "https://www.suse.com/security/cve/CVE-2018-10940/", }, { category: "self", summary: "SUSE CVE CVE-2018-1128 page", url: "https://www.suse.com/security/cve/CVE-2018-1128/", }, { category: "self", summary: "SUSE CVE CVE-2018-1129 page", url: "https://www.suse.com/security/cve/CVE-2018-1129/", }, { category: "self", summary: "SUSE CVE CVE-2018-12896 page", url: "https://www.suse.com/security/cve/CVE-2018-12896/", }, { category: "self", summary: "SUSE CVE CVE-2018-13093 page", url: "https://www.suse.com/security/cve/CVE-2018-13093/", }, { category: "self", summary: "SUSE CVE CVE-2018-13095 page", url: "https://www.suse.com/security/cve/CVE-2018-13095/", }, { category: "self", summary: "SUSE CVE CVE-2018-14613 page", url: "https://www.suse.com/security/cve/CVE-2018-14613/", }, { category: "self", summary: "SUSE CVE CVE-2018-14617 page", url: "https://www.suse.com/security/cve/CVE-2018-14617/", }, { category: "self", summary: "SUSE CVE CVE-2018-14633 page", url: "https://www.suse.com/security/cve/CVE-2018-14633/", }, { category: "self", summary: "SUSE CVE CVE-2018-15572 page", url: "https://www.suse.com/security/cve/CVE-2018-15572/", }, { category: "self", summary: "SUSE CVE CVE-2018-16658 page", url: "https://www.suse.com/security/cve/CVE-2018-16658/", }, { category: "self", summary: "SUSE CVE CVE-2018-17182 page", url: "https://www.suse.com/security/cve/CVE-2018-17182/", }, { category: "self", summary: "SUSE CVE CVE-2018-18386 page", url: "https://www.suse.com/security/cve/CVE-2018-18386/", }, { category: "self", summary: "SUSE CVE CVE-2018-18445 page", url: "https://www.suse.com/security/cve/CVE-2018-18445/", }, { category: "self", summary: "SUSE CVE CVE-2018-18710 page", url: "https://www.suse.com/security/cve/CVE-2018-18710/", }, { category: "self", summary: "SUSE CVE CVE-2018-6554 page", url: "https://www.suse.com/security/cve/CVE-2018-6554/", }, { category: "self", summary: "SUSE CVE CVE-2018-6555 page", url: "https://www.suse.com/security/cve/CVE-2018-6555/", }, { category: "self", summary: "SUSE CVE CVE-2018-9363 page", url: "https://www.suse.com/security/cve/CVE-2018-9363/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2018-11-30T16:43:13Z", generator: { date: "2018-11-30T16:43:13Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:3961-1", initial_release_date: "2018-11-30T16:43:13Z", revision_history: [ { date: "2018-11-30T16:43:13Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-azure-4.12.14-5.16.1.noarch", product: { name: "kernel-devel-azure-4.12.14-5.16.1.noarch", product_id: "kernel-devel-azure-4.12.14-5.16.1.noarch", }, }, { category: "product_version", name: "kernel-source-azure-4.12.14-5.16.1.noarch", product: { name: "kernel-source-azure-4.12.14-5.16.1.noarch", product_id: "kernel-source-azure-4.12.14-5.16.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-azure-4.12.14-5.16.1.x86_64", product: { name: "kernel-azure-4.12.14-5.16.1.x86_64", product_id: "kernel-azure-4.12.14-5.16.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-base-4.12.14-5.16.1.x86_64", product: { name: "kernel-azure-base-4.12.14-5.16.1.x86_64", product_id: "kernel-azure-base-4.12.14-5.16.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-devel-4.12.14-5.16.1.x86_64", product: { name: "kernel-azure-devel-4.12.14-5.16.1.x86_64", product_id: "kernel-azure-devel-4.12.14-5.16.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-azure-4.12.14-5.16.1.x86_64", product: { name: "kernel-syms-azure-4.12.14-5.16.1.x86_64", product_id: "kernel-syms-azure-4.12.14-5.16.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Public Cloud 15", product: { name: "SUSE Linux Enterprise Module for Public Cloud 15", product_id: "SUSE Linux Enterprise Module for Public Cloud 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-public-cloud:15", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-azure-4.12.14-5.16.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", product_id: "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", }, product_reference: "kernel-azure-4.12.14-5.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-base-4.12.14-5.16.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", product_id: "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", }, product_reference: "kernel-azure-base-4.12.14-5.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-4.12.14-5.16.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", product_id: "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", }, product_reference: "kernel-azure-devel-4.12.14-5.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-4.12.14-5.16.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15", product_id: "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", }, product_reference: "kernel-devel-azure-4.12.14-5.16.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-4.12.14-5.16.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15", product_id: "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", }, product_reference: "kernel-source-azure-4.12.14-5.16.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-4.12.14-5.16.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", product_id: "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", }, product_reference: "kernel-syms-azure-4.12.14-5.16.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15", }, ], }, vulnerabilities: [ { cve: "CVE-2017-16533", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16533", }, ], notes: [ { category: "general", text: "The usbhid_parse function in drivers/hid/usbhid/hid-core.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16533", url: "https://www.suse.com/security/cve/CVE-2017-16533", }, { category: "external", summary: "SUSE Bug 1066674 for CVE-2017-16533", url: "https://bugzilla.suse.com/1066674", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2017-16533", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2017-16533", url: "https://bugzilla.suse.com/1146519", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-30T16:43:13Z", details: "moderate", }, ], title: "CVE-2017-16533", }, { cve: "CVE-2017-18224", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-18224", }, ], notes: [ { category: "general", text: "In the Linux kernel before 4.15, fs/ocfs2/aops.c omits use of a semaphore and consequently has a race condition for access to the extent tree during read operations in DIRECT mode, which allows local users to cause a denial of service (BUG) by modifying a certain e_cpos field.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-18224", url: "https://www.suse.com/security/cve/CVE-2017-18224", }, { category: "external", summary: "SUSE Bug 1084831 for CVE-2017-18224", url: "https://bugzilla.suse.com/1084831", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-30T16:43:13Z", details: "moderate", }, ], title: "CVE-2017-18224", }, { cve: "CVE-2018-10902", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10902", }, ], notes: [ { category: "general", text: "It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10902", url: "https://www.suse.com/security/cve/CVE-2018-10902", }, { category: "external", summary: "SUSE Bug 1105322 for CVE-2018-10902", url: "https://bugzilla.suse.com/1105322", }, { category: "external", summary: "SUSE Bug 1105323 for CVE-2018-10902", url: "https://bugzilla.suse.com/1105323", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-30T16:43:13Z", details: "moderate", }, ], title: "CVE-2018-10902", }, { cve: "CVE-2018-10938", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10938", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel present since v4.0-rc1 and through v4.13-rc4. A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a denial-of-service. A certain non-default configuration of LSM (Linux Security Module) and NetLabel should be set up on a system before an attacker could leverage this flaw.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10938", url: "https://www.suse.com/security/cve/CVE-2018-10938", }, { category: "external", summary: "SUSE Bug 1106016 for CVE-2018-10938", url: "https://bugzilla.suse.com/1106016", }, { category: "external", summary: "SUSE Bug 1106191 for CVE-2018-10938", url: "https://bugzilla.suse.com/1106191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-30T16:43:13Z", details: "important", }, ], title: "CVE-2018-10938", }, { cve: "CVE-2018-10940", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10940", }, ], notes: [ { category: "general", text: "The cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c in the Linux kernel before 4.16.6 allows local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10940", url: "https://www.suse.com/security/cve/CVE-2018-10940", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10940", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092903 for CVE-2018-10940", url: "https://bugzilla.suse.com/1092903", }, { category: "external", summary: "SUSE Bug 1107689 for CVE-2018-10940", url: "https://bugzilla.suse.com/1107689", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-10940", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-30T16:43:13Z", details: "moderate", }, ], title: "CVE-2018-10940", }, { cve: "CVE-2018-1128", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1128", }, ], notes: [ { category: "general", text: "It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1128", url: "https://www.suse.com/security/cve/CVE-2018-1128", }, { category: "external", summary: "SUSE Bug 1096748 for CVE-2018-1128", url: "https://bugzilla.suse.com/1096748", }, { category: "external", summary: "SUSE Bug 1114710 for CVE-2018-1128", url: "https://bugzilla.suse.com/1114710", }, { category: "external", summary: "SUSE Bug 1177843 for CVE-2018-1128", url: "https://bugzilla.suse.com/1177843", }, { category: "external", summary: "SUSE Bug 1177859 for CVE-2018-1128", url: "https://bugzilla.suse.com/1177859", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-30T16:43:13Z", details: "important", }, ], title: "CVE-2018-1128", }, { cve: "CVE-2018-1129", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1129", }, ], notes: [ { category: "general", text: "A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1129", url: "https://www.suse.com/security/cve/CVE-2018-1129", }, { category: "external", summary: "SUSE Bug 1096748 for CVE-2018-1129", url: "https://bugzilla.suse.com/1096748", }, { category: "external", summary: "SUSE Bug 1114710 for CVE-2018-1129", url: "https://bugzilla.suse.com/1114710", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-30T16:43:13Z", details: "important", }, ], title: "CVE-2018-1129", }, { cve: "CVE-2018-12896", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-12896", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-12896", url: "https://www.suse.com/security/cve/CVE-2018-12896", }, { category: "external", summary: "SUSE Bug 1099922 for CVE-2018-12896", url: "https://bugzilla.suse.com/1099922", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-30T16:43:13Z", details: "low", }, ], title: "CVE-2018-12896", }, { cve: "CVE-2018-13093", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-13093", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/xfs/xfs_icache.c in the Linux kernel through 4.17.3. There is a NULL pointer dereference and panic in lookup_slow() on a NULL inode->i_ops pointer when doing pathwalks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during allocation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-13093", url: "https://www.suse.com/security/cve/CVE-2018-13093", }, { category: "external", summary: "SUSE Bug 1100001 for CVE-2018-13093", url: "https://bugzilla.suse.com/1100001", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-30T16:43:13Z", details: "moderate", }, ], title: "CVE-2018-13093", }, { cve: "CVE-2018-13095", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-13095", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.17.3. A denial of service (memory corruption and BUG) can occur for a corrupted xfs image upon encountering an inode that is in extent format, but has more extents than fit in the inode fork.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-13095", url: "https://www.suse.com/security/cve/CVE-2018-13095", }, { category: "external", summary: "SUSE Bug 1099999 for CVE-2018-13095", url: "https://bugzilla.suse.com/1099999", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-30T16:43:13Z", details: "moderate", }, ], title: "CVE-2018-13095", }, { cve: "CVE-2018-14613", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14613", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in io_ctl_map_page() when mounting and operating a crafted btrfs image, because of a lack of block group item validation in check_leaf_item in fs/btrfs/tree-checker.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14613", url: "https://www.suse.com/security/cve/CVE-2018-14613", }, { category: "external", summary: "SUSE Bug 1102896 for CVE-2018-14613", url: "https://bugzilla.suse.com/1102896", }, { category: "external", summary: "SUSE Bug 1103800 for CVE-2018-14613", url: "https://bugzilla.suse.com/1103800", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-30T16:43:13Z", details: "moderate", }, ], title: "CVE-2018-14613", }, { cve: "CVE-2018-14617", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14617", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.17.10. There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14617", url: "https://www.suse.com/security/cve/CVE-2018-14617", }, { category: "external", summary: "SUSE Bug 1102870 for CVE-2018-14617", url: "https://bugzilla.suse.com/1102870", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-30T16:43:13Z", details: "moderate", }, ], title: "CVE-2018-14617", }, { cve: "CVE-2018-14633", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14633", }, ], notes: [ { category: "general", text: "A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14633", url: "https://www.suse.com/security/cve/CVE-2018-14633", }, { category: "external", summary: "SUSE Bug 1107829 for CVE-2018-14633", url: "https://bugzilla.suse.com/1107829", }, { category: "external", summary: "SUSE Bug 1107832 for CVE-2018-14633", url: "https://bugzilla.suse.com/1107832", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-30T16:43:13Z", details: "important", }, ], title: "CVE-2018-14633", }, { cve: "CVE-2018-15572", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-15572", }, ], notes: [ { category: "general", text: "The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the Linux kernel before 4.18.1 does not always fill RSB upon a context switch, which makes it easier for attackers to conduct userspace-userspace spectreRSB attacks.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-15572", url: "https://www.suse.com/security/cve/CVE-2018-15572", }, { category: "external", summary: "SUSE Bug 1102517 for CVE-2018-15572", url: "https://bugzilla.suse.com/1102517", }, { category: "external", summary: "SUSE Bug 1105296 for CVE-2018-15572", url: "https://bugzilla.suse.com/1105296", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-30T16:43:13Z", details: "important", }, ], title: "CVE-2018-15572", }, { cve: "CVE-2018-16658", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16658", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16658", url: "https://www.suse.com/security/cve/CVE-2018-16658", }, { category: "external", summary: "SUSE Bug 1092903 for CVE-2018-16658", url: "https://bugzilla.suse.com/1092903", }, { category: "external", summary: "SUSE Bug 1107689 for CVE-2018-16658", url: "https://bugzilla.suse.com/1107689", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-16658", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-30T16:43:13Z", details: "low", }, ], title: "CVE-2018-16658", }, { cve: "CVE-2018-17182", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-17182", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_all function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-17182", url: "https://www.suse.com/security/cve/CVE-2018-17182", }, { category: "external", summary: "SUSE Bug 1108399 for CVE-2018-17182", url: "https://bugzilla.suse.com/1108399", }, { category: "external", summary: "SUSE Bug 1110233 for CVE-2018-17182", url: "https://bugzilla.suse.com/1110233", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-30T16:43:13Z", details: "moderate", }, ], title: "CVE-2018-17182", }, { cve: "CVE-2018-18386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18386", }, ], notes: [ { category: "general", text: "drivers/tty/n_tty.c in the Linux kernel before 4.14.11 allows local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18386", url: "https://www.suse.com/security/cve/CVE-2018-18386", }, { category: "external", summary: "SUSE Bug 1094825 for CVE-2018-18386", url: "https://bugzilla.suse.com/1094825", }, { category: "external", summary: "SUSE Bug 1112039 for CVE-2018-18386", url: "https://bugzilla.suse.com/1112039", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-30T16:43:13Z", details: "moderate", }, ], title: "CVE-2018-18386", }, { cve: "CVE-2018-18445", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18445", }, ], notes: [ { category: "general", text: "In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18445", url: "https://www.suse.com/security/cve/CVE-2018-18445", }, { category: "external", summary: "SUSE Bug 1112372 for CVE-2018-18445", url: "https://bugzilla.suse.com/1112372", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-30T16:43:13Z", details: "low", }, ], title: "CVE-2018-18445", }, { cve: "CVE-2018-18710", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18710", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18710", url: "https://www.suse.com/security/cve/CVE-2018-18710", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-18710", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-30T16:43:13Z", details: "moderate", }, ], title: "CVE-2018-18710", }, { cve: "CVE-2018-6554", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6554", }, ], notes: [ { category: "general", text: "Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6554", url: "https://www.suse.com/security/cve/CVE-2018-6554", }, { category: "external", summary: "SUSE Bug 1106509 for CVE-2018-6554", url: "https://bugzilla.suse.com/1106509", }, { category: "external", summary: "SUSE Bug 1106511 for CVE-2018-6554", url: "https://bugzilla.suse.com/1106511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-30T16:43:13Z", details: "low", }, ], title: "CVE-2018-6554", }, { cve: "CVE-2018-6555", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6555", }, ], notes: [ { category: "general", text: "The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6555", url: "https://www.suse.com/security/cve/CVE-2018-6555", }, { category: "external", summary: "SUSE Bug 1106509 for CVE-2018-6555", url: "https://bugzilla.suse.com/1106509", }, { category: "external", summary: "SUSE Bug 1106511 for CVE-2018-6555", url: "https://bugzilla.suse.com/1106511", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2018-6555", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-30T16:43:13Z", details: "moderate", }, ], title: "CVE-2018-6555", }, { cve: "CVE-2018-9363", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-9363", }, ], notes: [ { category: "general", text: "In the hidp_process_report in bluetooth, there is an integer overflow. This could lead to an out of bounds write with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-65853588 References: Upstream kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-9363", url: "https://www.suse.com/security/cve/CVE-2018-9363", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-9363", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1105292 for CVE-2018-9363", url: "https://bugzilla.suse.com/1105292", }, { category: "external", summary: "SUSE Bug 1105293 for CVE-2018-9363", url: "https://bugzilla.suse.com/1105293", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.16.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.16.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.16.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-30T16:43:13Z", details: "important", }, ], title: "CVE-2018-9363", }, ], }
suse-su-2019:13937-1
Vulnerability from csaf_suse
Published
2019-01-29 12:13
Modified
2019-01-29 12:13
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 kernel was updated to 3.0.101 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-9516: In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1108498).
- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized (bnc#1116841).
- CVE-2018-19985: The function hso_probe read if_num from the USB device (as an u8) and used it without a length check to index an array, resulting in an OOB memory read in hso_probe or hso_get_config_data that could be used by local attackers (bnc#1120743).
- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).
- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1118319).
- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).
- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused (bnc#1113769).
- CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).
- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).
- CVE-2017-7273: The cp_report_fixup function in drivers/hid/hid-cypress.c allowed physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report (bnc#1031240).
- CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674).
- CVE-2017-1000407: Fixed a denial of service, which was caused by flooding the diagnostic port 0x80 an exception leading to a kernel panic (bnc#1071021).
The following non-security bugs were fixed:
- ALSA: pcm: Fix potential deadlock in OSS emulation (bsc#968018, bsc#1104366).
- cpusets, isolcpus: exclude isolcpus from load balancing in cpusets (bsc#1119255).
- Drivers: scsi: storvsc: Change the limits to reflect the values on the host (bug#1107189).
- drivers: scsi: storvsc: Correctly handle TEST_UNIT_READY failure (bug#1107189).
- Drivers: scsi: storvsc: Filter commands based on the storage protocol version (bug#1107189).
- Drivers: scsi: storvsc: Fix a bug in handling VMBUS protocol version (bug#1107189).
- Drivers: scsi: storvsc: Implement a eh_timed_out handler (bug#1107189).
- Drivers: scsi: storvsc: Set cmd_per_lun to reflect value supported by the Host (bug#1107189).
- drivers: scsi: storvsc: Set srb_flags in all cases (bug#1107189).
- EHCI: improved logic for isochronous scheduling (bsc#1117515).
- ipv4: remove the unnecessary variable in udp_mcast_next (bsc#1104070).
- KEYS: prevent creating a different user's keyrings (bnc#1094186).
- KVM: x86: Fix the duplicate failure path handling in vmx_init (bsc#1104367).
- MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#1116412).
- MM/vmscan.c: avoid throttling reclaim for loop-back nfsd threads (bsc#1116412).
- net/ipv6/udp: Fix ipv6 multicast socket filter regression (bsc#1104070).
- NFS: avoid deadlocks with loop-back mounted NFS filesystems (bsc#1116412).
- NFS: avoid waiting at all in nfs_release_page when congested (bsc#1116412).
- NFS: Do not write enable new pages while an invalidation is proceeding (bsc#1116412).
- NFS: Fix a regression in the read() syscall (bsc#1116412).
- NFS: Fix races in nfs_revalidate_mapping (bsc#1116412).
- NFS: fix the handling of NFS_INO_INVALID_DATA flag in nfs_revalidate_mapping (bsc#1116412).
- NFS: Fix writeback performance issue on cache invalidation (bsc#1116412).
- reiserfs: do not preallocate blocks for extended attributes (bsc#990682).
- reiserfs: fix race in readdir (bsc#1039803).
- sched, isolcpu: make cpu_isolated_map visible outside scheduler (bsc#1119255).
- scsi: storvsc: Always send on the selected outgoing channel (bug#1107189).
- scsi: storvsc: Do not assume that the scatterlist is not chained (bug#1107189).
- scsi: storvsc: Fix a bug in copy_from_bounce_buffer() (bug#1107189).
- scsi: storvsc: Increase the ring buffer size (bug#1107189).
- scsi: storvsc: Size the queue depth based on the ringbuffer size (bug#1107189).
- storvsc: fix a bug in storvsc limits (bug#1107189).
- storvsc: force discovery of LUNs that may have been removed (bug#1107189).
- storvsc: get rid of overly verbose warning messages (bug#1107189).
- storvsc: in responce to a scan event, scan the host (bug#1107189).
- storvsc: Set the SRB flags correctly when no data transfer is needed (bug#1107189).
- udp: ipv4: Add udp early demux (bsc#1104070).
- udp: restore UDPlite many-cast delivery (bsc#1104070).
- udp: Simplify __udp*_lib_mcast_deliver (bsc#1104070).
- udp: Use hash2 for long hash1 chains in __udp*_lib_mcast_deliver (bsc#1104070).
- USB: EHCI: add new root-hub state: STOPPING (bsc#1117515).
- USB: EHCI: add pointer to end of async-unlink list (bsc#1117515).
- USB: EHCI: add symbolic constants for QHs (bsc#1117515).
- USB: EHCI: always scan each interrupt QH (bsc#1117515).
- USB: EHCI: do not lose events during a scan (bsc#1117515).
- USB: EHCI: do not refcount iso_stream structures (bsc#1117515).
- USB: EHCI: do not refcount QHs (bsc#1117515).
- USB: EHCI: fix initialization bug in iso_stream_schedule() (bsc#1117515).
- USB: EHCI: fix up locking (bsc#1117515).
- USB: EHCI: initialize data before resetting hardware (bsc#1117515).
- USB: EHCI: introduce high-res timer (bsc#1117515).
- USB: EHCI: remove PS3 status polling (bsc#1117515).
- USB: EHCI: remove unneeded suspend/resume code (bsc#1117515).
- USB: EHCI: rename 'reclaim' (bsc#1117515).
- USB: EHCI: resolve some unlikely races (bsc#1117515).
- USB: EHCI: return void instead of 0 (bsc#1117515).
- USB: EHCI: simplify isochronous scanning (bsc#1117515).
- USB: EHCI: unlink multiple async QHs together (bsc#1117515).
- USB: EHCI: use hrtimer for async schedule (bsc#1117515).
- USB: EHCI: use hrtimer for controller death (bsc#1117515).
- USB: EHCI: use hrtimer for interrupt QH unlink (bsc#1117515).
- USB: EHCI: use hrtimer for (s)iTD deallocation (bsc#1117515).
- USB: EHCI: use hrtimer for the IAA watchdog (bsc#1117515).
- USB: EHCI: use hrtimer for the I/O watchdog (bsc#1117515).
- USB: EHCI: use hrtimer for the periodic schedule (bsc#1117515).
- USB: EHCI: use hrtimer for unlinking empty async QHs (bsc#1117515).
- XFS: do not BUG() on mixed direct and mapped I/O (bsc#1114920).
- XFS: stop searching for free slots in an inode chunk when there are none (bsc#1115007).
- XFS: validate sb_logsunit is a multiple of the fs blocksize (bsc#1115038).
Patchnames
sleposp3-kernel-20190123-13937,slessp3-kernel-20190123-13937,slexsp3-kernel-20190123-13937
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 12 SP3 kernel was updated to 3.0.101 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-9516: In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1108498).\n- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized (bnc#1116841).\n- CVE-2018-19985: The function hso_probe read if_num from the USB device (as an u8) and used it without a length check to index an array, resulting in an OOB memory read in hso_probe or hso_get_config_data that could be used by local attackers (bnc#1120743).\n- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).\n- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1118319).\n- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).\n- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused (bnc#1113769).\n- CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).\n- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).\n- CVE-2017-7273: The cp_report_fixup function in drivers/hid/hid-cypress.c allowed physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report (bnc#1031240).\n- CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674).\n- CVE-2017-1000407: Fixed a denial of service, which was caused by flooding the diagnostic port 0x80 an exception leading to a kernel panic (bnc#1071021).\n\nThe following non-security bugs were fixed:\n\n- ALSA: pcm: Fix potential deadlock in OSS emulation (bsc#968018, bsc#1104366).\n- cpusets, isolcpus: exclude isolcpus from load balancing in cpusets (bsc#1119255).\n- Drivers: scsi: storvsc: Change the limits to reflect the values on the host (bug#1107189).\n- drivers: scsi: storvsc: Correctly handle TEST_UNIT_READY failure (bug#1107189).\n- Drivers: scsi: storvsc: Filter commands based on the storage protocol version (bug#1107189).\n- Drivers: scsi: storvsc: Fix a bug in handling VMBUS protocol version (bug#1107189).\n- Drivers: scsi: storvsc: Implement a eh_timed_out handler (bug#1107189).\n- Drivers: scsi: storvsc: Set cmd_per_lun to reflect value supported by the Host (bug#1107189).\n- drivers: scsi: storvsc: Set srb_flags in all cases (bug#1107189).\n- EHCI: improved logic for isochronous scheduling (bsc#1117515).\n- ipv4: remove the unnecessary variable in udp_mcast_next (bsc#1104070).\n- KEYS: prevent creating a different user's keyrings (bnc#1094186).\n- KVM: x86: Fix the duplicate failure path handling in vmx_init (bsc#1104367).\n- MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#1116412).\n- MM/vmscan.c: avoid throttling reclaim for loop-back nfsd threads (bsc#1116412).\n- net/ipv6/udp: Fix ipv6 multicast socket filter regression (bsc#1104070).\n- NFS: avoid deadlocks with loop-back mounted NFS filesystems (bsc#1116412).\n- NFS: avoid waiting at all in nfs_release_page when congested (bsc#1116412).\n- NFS: Do not write enable new pages while an invalidation is proceeding (bsc#1116412).\n- NFS: Fix a regression in the read() syscall (bsc#1116412).\n- NFS: Fix races in nfs_revalidate_mapping (bsc#1116412).\n- NFS: fix the handling of NFS_INO_INVALID_DATA flag in nfs_revalidate_mapping (bsc#1116412).\n- NFS: Fix writeback performance issue on cache invalidation (bsc#1116412).\n- reiserfs: do not preallocate blocks for extended attributes (bsc#990682).\n- reiserfs: fix race in readdir (bsc#1039803).\n- sched, isolcpu: make cpu_isolated_map visible outside scheduler (bsc#1119255).\n- scsi: storvsc: Always send on the selected outgoing channel (bug#1107189).\n- scsi: storvsc: Do not assume that the scatterlist is not chained (bug#1107189).\n- scsi: storvsc: Fix a bug in copy_from_bounce_buffer() (bug#1107189).\n- scsi: storvsc: Increase the ring buffer size (bug#1107189).\n- scsi: storvsc: Size the queue depth based on the ringbuffer size (bug#1107189).\n- storvsc: fix a bug in storvsc limits (bug#1107189).\n- storvsc: force discovery of LUNs that may have been removed (bug#1107189).\n- storvsc: get rid of overly verbose warning messages (bug#1107189).\n- storvsc: in responce to a scan event, scan the host (bug#1107189).\n- storvsc: Set the SRB flags correctly when no data transfer is needed (bug#1107189).\n- udp: ipv4: Add udp early demux (bsc#1104070).\n- udp: restore UDPlite many-cast delivery (bsc#1104070).\n- udp: Simplify __udp*_lib_mcast_deliver (bsc#1104070).\n- udp: Use hash2 for long hash1 chains in __udp*_lib_mcast_deliver (bsc#1104070).\n- USB: EHCI: add new root-hub state: STOPPING (bsc#1117515).\n- USB: EHCI: add pointer to end of async-unlink list (bsc#1117515).\n- USB: EHCI: add symbolic constants for QHs (bsc#1117515).\n- USB: EHCI: always scan each interrupt QH (bsc#1117515).\n- USB: EHCI: do not lose events during a scan (bsc#1117515).\n- USB: EHCI: do not refcount iso_stream structures (bsc#1117515).\n- USB: EHCI: do not refcount QHs (bsc#1117515).\n- USB: EHCI: fix initialization bug in iso_stream_schedule() (bsc#1117515).\n- USB: EHCI: fix up locking (bsc#1117515).\n- USB: EHCI: initialize data before resetting hardware (bsc#1117515).\n- USB: EHCI: introduce high-res timer (bsc#1117515).\n- USB: EHCI: remove PS3 status polling (bsc#1117515).\n- USB: EHCI: remove unneeded suspend/resume code (bsc#1117515).\n- USB: EHCI: rename 'reclaim' (bsc#1117515).\n- USB: EHCI: resolve some unlikely races (bsc#1117515).\n- USB: EHCI: return void instead of 0 (bsc#1117515).\n- USB: EHCI: simplify isochronous scanning (bsc#1117515).\n- USB: EHCI: unlink multiple async QHs together (bsc#1117515).\n- USB: EHCI: use hrtimer for async schedule (bsc#1117515).\n- USB: EHCI: use hrtimer for controller death (bsc#1117515).\n- USB: EHCI: use hrtimer for interrupt QH unlink (bsc#1117515).\n- USB: EHCI: use hrtimer for (s)iTD deallocation (bsc#1117515).\n- USB: EHCI: use hrtimer for the IAA watchdog (bsc#1117515).\n- USB: EHCI: use hrtimer for the I/O watchdog (bsc#1117515).\n- USB: EHCI: use hrtimer for the periodic schedule (bsc#1117515).\n- USB: EHCI: use hrtimer for unlinking empty async QHs (bsc#1117515).\n- XFS: do not BUG() on mixed direct and mapped I/O (bsc#1114920).\n- XFS: stop searching for free slots in an inode chunk when there are none (bsc#1115007).\n- XFS: validate sb_logsunit is a multiple of the fs blocksize (bsc#1115038).\n", title: "Description of the patch", }, { category: "details", text: "sleposp3-kernel-20190123-13937,slessp3-kernel-20190123-13937,slexsp3-kernel-20190123-13937", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_13937-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:13937-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-201913937-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:13937-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-January/005067.html", }, { category: "self", summary: "SUSE Bug 1031240", url: "https://bugzilla.suse.com/1031240", }, { category: "self", summary: "SUSE Bug 1039803", url: "https://bugzilla.suse.com/1039803", }, { category: "self", summary: "SUSE Bug 1066674", url: "https://bugzilla.suse.com/1066674", }, { category: "self", summary: "SUSE Bug 1071021", url: "https://bugzilla.suse.com/1071021", }, { category: "self", summary: "SUSE Bug 1094186", url: "https://bugzilla.suse.com/1094186", }, { category: "self", summary: "SUSE Bug 1094825", url: "https://bugzilla.suse.com/1094825", }, { category: "self", summary: "SUSE Bug 1104070", url: "https://bugzilla.suse.com/1104070", }, { category: "self", summary: "SUSE Bug 1104366", url: "https://bugzilla.suse.com/1104366", }, { category: "self", summary: "SUSE Bug 1104367", url: "https://bugzilla.suse.com/1104367", }, { category: "self", summary: "SUSE Bug 1107189", url: "https://bugzilla.suse.com/1107189", }, { category: "self", summary: "SUSE Bug 1108498", url: "https://bugzilla.suse.com/1108498", }, { category: "self", summary: "SUSE Bug 1109200", url: "https://bugzilla.suse.com/1109200", }, { category: "self", summary: "SUSE Bug 1113201", url: "https://bugzilla.suse.com/1113201", }, { category: "self", summary: "SUSE Bug 1113751", url: "https://bugzilla.suse.com/1113751", }, { category: "self", summary: "SUSE Bug 1113769", url: "https://bugzilla.suse.com/1113769", }, { category: "self", summary: "SUSE Bug 1114920", url: "https://bugzilla.suse.com/1114920", }, { category: "self", summary: "SUSE Bug 1115007", url: "https://bugzilla.suse.com/1115007", }, { category: "self", summary: "SUSE Bug 1115038", url: "https://bugzilla.suse.com/1115038", }, { category: "self", summary: "SUSE Bug 1116412", url: "https://bugzilla.suse.com/1116412", }, { category: "self", summary: "SUSE Bug 1116841", url: "https://bugzilla.suse.com/1116841", }, { category: "self", summary: "SUSE Bug 1117515", url: "https://bugzilla.suse.com/1117515", }, { category: "self", summary: "SUSE Bug 1118152", url: "https://bugzilla.suse.com/1118152", }, { category: "self", summary: "SUSE Bug 1118319", url: "https://bugzilla.suse.com/1118319", }, { category: "self", summary: "SUSE Bug 1119255", url: "https://bugzilla.suse.com/1119255", }, { category: "self", summary: "SUSE Bug 1119714", url: "https://bugzilla.suse.com/1119714", }, { category: "self", summary: "SUSE Bug 1120743", url: "https://bugzilla.suse.com/1120743", }, { category: "self", summary: "SUSE Bug 905299", url: "https://bugzilla.suse.com/905299", }, { category: "self", summary: "SUSE Bug 936875", url: "https://bugzilla.suse.com/936875", }, { category: "self", summary: "SUSE Bug 968018", url: "https://bugzilla.suse.com/968018", }, { category: "self", summary: "SUSE Bug 990682", url: "https://bugzilla.suse.com/990682", }, { category: "self", summary: "SUSE CVE CVE-2017-1000407 page", url: "https://www.suse.com/security/cve/CVE-2017-1000407/", }, { category: "self", summary: "SUSE CVE CVE-2017-16533 page", url: "https://www.suse.com/security/cve/CVE-2017-16533/", }, { category: "self", summary: "SUSE CVE CVE-2017-7273 page", url: "https://www.suse.com/security/cve/CVE-2017-7273/", }, { category: "self", summary: "SUSE CVE CVE-2018-18281 page", url: "https://www.suse.com/security/cve/CVE-2018-18281/", }, { category: "self", summary: "SUSE CVE CVE-2018-18386 page", url: "https://www.suse.com/security/cve/CVE-2018-18386/", }, { category: "self", summary: "SUSE CVE CVE-2018-18710 page", url: "https://www.suse.com/security/cve/CVE-2018-18710/", }, { category: "self", summary: "SUSE CVE CVE-2018-19407 page", url: "https://www.suse.com/security/cve/CVE-2018-19407/", }, { category: "self", summary: "SUSE CVE CVE-2018-19824 page", url: "https://www.suse.com/security/cve/CVE-2018-19824/", }, { category: "self", summary: "SUSE CVE CVE-2018-19985 page", url: "https://www.suse.com/security/cve/CVE-2018-19985/", }, { category: "self", summary: "SUSE CVE CVE-2018-20169 page", url: "https://www.suse.com/security/cve/CVE-2018-20169/", }, { category: "self", summary: "SUSE CVE CVE-2018-9516 page", url: "https://www.suse.com/security/cve/CVE-2018-9516/", }, { category: "self", summary: "SUSE CVE CVE-2018-9568 page", url: "https://www.suse.com/security/cve/CVE-2018-9568/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2019-01-29T12:13:02Z", generator: { date: "2019-01-29T12:13:02Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:13937-1", initial_release_date: "2019-01-29T12:13:02Z", revision_history: [ { date: "2019-01-29T12:13:02Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-default-3.0.101-0.47.106.59.1.i586", product: { name: "kernel-default-3.0.101-0.47.106.59.1.i586", product_id: "kernel-default-3.0.101-0.47.106.59.1.i586", }, }, { category: "product_version", name: "kernel-default-base-3.0.101-0.47.106.59.1.i586", product: { name: "kernel-default-base-3.0.101-0.47.106.59.1.i586", product_id: "kernel-default-base-3.0.101-0.47.106.59.1.i586", }, }, { category: "product_version", name: "kernel-default-devel-3.0.101-0.47.106.59.1.i586", product: { name: "kernel-default-devel-3.0.101-0.47.106.59.1.i586", product_id: "kernel-default-devel-3.0.101-0.47.106.59.1.i586", }, }, { category: "product_version", name: "kernel-ec2-3.0.101-0.47.106.59.1.i586", product: { name: "kernel-ec2-3.0.101-0.47.106.59.1.i586", product_id: "kernel-ec2-3.0.101-0.47.106.59.1.i586", }, }, { category: "product_version", name: "kernel-ec2-base-3.0.101-0.47.106.59.1.i586", product: { name: "kernel-ec2-base-3.0.101-0.47.106.59.1.i586", product_id: "kernel-ec2-base-3.0.101-0.47.106.59.1.i586", }, }, { category: "product_version", name: "kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", product: { name: "kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", product_id: "kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", }, }, { category: "product_version", name: "kernel-pae-3.0.101-0.47.106.59.1.i586", product: { name: "kernel-pae-3.0.101-0.47.106.59.1.i586", product_id: "kernel-pae-3.0.101-0.47.106.59.1.i586", }, }, { category: "product_version", name: "kernel-pae-base-3.0.101-0.47.106.59.1.i586", product: { name: "kernel-pae-base-3.0.101-0.47.106.59.1.i586", product_id: "kernel-pae-base-3.0.101-0.47.106.59.1.i586", }, }, { category: "product_version", name: "kernel-pae-devel-3.0.101-0.47.106.59.1.i586", product: { name: "kernel-pae-devel-3.0.101-0.47.106.59.1.i586", product_id: "kernel-pae-devel-3.0.101-0.47.106.59.1.i586", }, }, { category: "product_version", name: "kernel-source-3.0.101-0.47.106.59.1.i586", product: { name: "kernel-source-3.0.101-0.47.106.59.1.i586", product_id: "kernel-source-3.0.101-0.47.106.59.1.i586", }, }, { category: "product_version", name: "kernel-syms-3.0.101-0.47.106.59.1.i586", product: { name: "kernel-syms-3.0.101-0.47.106.59.1.i586", product_id: "kernel-syms-3.0.101-0.47.106.59.1.i586", }, }, { category: "product_version", name: "kernel-trace-3.0.101-0.47.106.59.1.i586", product: { name: "kernel-trace-3.0.101-0.47.106.59.1.i586", product_id: "kernel-trace-3.0.101-0.47.106.59.1.i586", }, }, { category: "product_version", name: "kernel-trace-base-3.0.101-0.47.106.59.1.i586", product: { name: "kernel-trace-base-3.0.101-0.47.106.59.1.i586", product_id: "kernel-trace-base-3.0.101-0.47.106.59.1.i586", }, }, { category: "product_version", name: "kernel-trace-devel-3.0.101-0.47.106.59.1.i586", product: { name: "kernel-trace-devel-3.0.101-0.47.106.59.1.i586", product_id: "kernel-trace-devel-3.0.101-0.47.106.59.1.i586", }, }, { category: "product_version", name: "kernel-xen-3.0.101-0.47.106.59.1.i586", product: { name: "kernel-xen-3.0.101-0.47.106.59.1.i586", product_id: "kernel-xen-3.0.101-0.47.106.59.1.i586", }, }, { category: "product_version", name: "kernel-xen-base-3.0.101-0.47.106.59.1.i586", product: { name: "kernel-xen-base-3.0.101-0.47.106.59.1.i586", product_id: "kernel-xen-base-3.0.101-0.47.106.59.1.i586", }, }, { category: "product_version", name: "kernel-xen-devel-3.0.101-0.47.106.59.1.i586", product: { name: "kernel-xen-devel-3.0.101-0.47.106.59.1.i586", product_id: "kernel-xen-devel-3.0.101-0.47.106.59.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "kernel-default-3.0.101-0.47.106.59.1.s390x", product: { name: "kernel-default-3.0.101-0.47.106.59.1.s390x", product_id: "kernel-default-3.0.101-0.47.106.59.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-3.0.101-0.47.106.59.1.s390x", product: { name: "kernel-default-base-3.0.101-0.47.106.59.1.s390x", product_id: "kernel-default-base-3.0.101-0.47.106.59.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-3.0.101-0.47.106.59.1.s390x", product: { name: "kernel-default-devel-3.0.101-0.47.106.59.1.s390x", product_id: "kernel-default-devel-3.0.101-0.47.106.59.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-3.0.101-0.47.106.59.1.s390x", product: { name: "kernel-default-man-3.0.101-0.47.106.59.1.s390x", product_id: "kernel-default-man-3.0.101-0.47.106.59.1.s390x", }, }, { category: "product_version", name: "kernel-source-3.0.101-0.47.106.59.1.s390x", product: { name: "kernel-source-3.0.101-0.47.106.59.1.s390x", product_id: "kernel-source-3.0.101-0.47.106.59.1.s390x", }, }, { category: "product_version", name: "kernel-syms-3.0.101-0.47.106.59.1.s390x", product: { name: "kernel-syms-3.0.101-0.47.106.59.1.s390x", product_id: "kernel-syms-3.0.101-0.47.106.59.1.s390x", }, }, { category: "product_version", name: "kernel-trace-3.0.101-0.47.106.59.1.s390x", product: { name: "kernel-trace-3.0.101-0.47.106.59.1.s390x", product_id: "kernel-trace-3.0.101-0.47.106.59.1.s390x", }, }, { category: "product_version", name: "kernel-trace-base-3.0.101-0.47.106.59.1.s390x", product: { name: "kernel-trace-base-3.0.101-0.47.106.59.1.s390x", product_id: "kernel-trace-base-3.0.101-0.47.106.59.1.s390x", }, }, { category: "product_version", name: "kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", product: { name: "kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", product_id: "kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", product: { name: "kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", product_id: "kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", }, }, { category: "product_version", name: "kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", product: { name: "kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", product_id: "kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", }, }, { category: "product_version", name: "kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", product: { name: "kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", product_id: "kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", }, }, { category: "product_version", name: "kernel-default-3.0.101-0.47.106.59.1.x86_64", product: { name: "kernel-default-3.0.101-0.47.106.59.1.x86_64", product_id: "kernel-default-3.0.101-0.47.106.59.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-3.0.101-0.47.106.59.1.x86_64", product: { name: "kernel-default-base-3.0.101-0.47.106.59.1.x86_64", product_id: "kernel-default-base-3.0.101-0.47.106.59.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", product: { name: "kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", product_id: "kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-3.0.101-0.47.106.59.1.x86_64", product: { name: "kernel-ec2-3.0.101-0.47.106.59.1.x86_64", product_id: "kernel-ec2-3.0.101-0.47.106.59.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", product: { name: "kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", product_id: "kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", product: { name: "kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", product_id: "kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", }, }, { category: "product_version", name: "kernel-source-3.0.101-0.47.106.59.1.x86_64", product: { name: "kernel-source-3.0.101-0.47.106.59.1.x86_64", product_id: "kernel-source-3.0.101-0.47.106.59.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-3.0.101-0.47.106.59.1.x86_64", product: { name: "kernel-syms-3.0.101-0.47.106.59.1.x86_64", product_id: "kernel-syms-3.0.101-0.47.106.59.1.x86_64", }, }, { category: "product_version", name: "kernel-trace-3.0.101-0.47.106.59.1.x86_64", product: { name: "kernel-trace-3.0.101-0.47.106.59.1.x86_64", product_id: "kernel-trace-3.0.101-0.47.106.59.1.x86_64", }, }, { category: "product_version", name: "kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", product: { name: "kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", product_id: "kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", }, }, { category: "product_version", name: "kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", product: { name: "kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", product_id: "kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-3.0.101-0.47.106.59.1.x86_64", product: { name: "kernel-xen-3.0.101-0.47.106.59.1.x86_64", product_id: "kernel-xen-3.0.101-0.47.106.59.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", product: { name: "kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", product_id: "kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", product: { name: "kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", product_id: "kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Point of Sale 11 SP3", product: { name: "SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-pos:11:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 11 SP3-LTSS", product: { name: "SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:suse_sles_ltss:11:sp3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-default-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-default-base-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-default-devel-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-ec2-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-base-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-ec2-base-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-devel-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-pae-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-pae-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-pae-base-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-pae-base-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-pae-devel-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-pae-devel-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-source-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-syms-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-trace-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-trace-base-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-trace-devel-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-xen-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-xen-base-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-xen-devel-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", }, product_reference: "kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", }, product_reference: "kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", }, product_reference: "kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-default-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-0.47.106.59.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", }, product_reference: "kernel-default-3.0.101-0.47.106.59.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-0.47.106.59.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", }, product_reference: "kernel-default-3.0.101-0.47.106.59.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-default-base-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-0.47.106.59.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", }, product_reference: "kernel-default-base-3.0.101-0.47.106.59.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-0.47.106.59.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", }, product_reference: "kernel-default-base-3.0.101-0.47.106.59.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-default-devel-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-0.47.106.59.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", }, product_reference: "kernel-default-devel-3.0.101-0.47.106.59.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-0.47.106.59.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", }, product_reference: "kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-3.0.101-0.47.106.59.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", }, product_reference: "kernel-default-man-3.0.101-0.47.106.59.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-ec2-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-3.0.101-0.47.106.59.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", }, product_reference: "kernel-ec2-3.0.101-0.47.106.59.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-base-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-ec2-base-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", }, product_reference: "kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-devel-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", }, product_reference: "kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-pae-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-pae-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-pae-base-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-pae-base-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-pae-devel-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-pae-devel-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-source-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-0.47.106.59.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", }, product_reference: "kernel-source-3.0.101-0.47.106.59.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-0.47.106.59.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", }, product_reference: "kernel-source-3.0.101-0.47.106.59.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-syms-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-0.47.106.59.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", }, product_reference: "kernel-syms-3.0.101-0.47.106.59.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-0.47.106.59.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", }, product_reference: "kernel-syms-3.0.101-0.47.106.59.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-trace-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-0.47.106.59.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", }, product_reference: "kernel-trace-3.0.101-0.47.106.59.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-0.47.106.59.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", }, product_reference: "kernel-trace-3.0.101-0.47.106.59.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-trace-base-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-0.47.106.59.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", }, product_reference: "kernel-trace-base-3.0.101-0.47.106.59.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-0.47.106.59.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", }, product_reference: "kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-trace-devel-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-0.47.106.59.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", }, product_reference: "kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", }, product_reference: "kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-xen-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.0.101-0.47.106.59.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", }, product_reference: "kernel-xen-3.0.101-0.47.106.59.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-xen-base-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.0.101-0.47.106.59.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", }, product_reference: "kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.0.101-0.47.106.59.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", }, product_reference: "kernel-xen-devel-3.0.101-0.47.106.59.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", }, product_reference: "kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, ], }, vulnerabilities: [ { cve: "CVE-2017-1000407", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000407", }, ], notes: [ { category: "general", text: "The Linux Kernel 2.6.32 and later are affected by a denial of service, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000407", url: "https://www.suse.com/security/cve/CVE-2017-1000407", }, { category: "external", summary: "SUSE Bug 1071021 for CVE-2017-1000407", url: "https://bugzilla.suse.com/1071021", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-29T12:13:02Z", details: "moderate", }, ], title: "CVE-2017-1000407", }, { cve: "CVE-2017-16533", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16533", }, ], notes: [ { category: "general", text: "The usbhid_parse function in drivers/hid/usbhid/hid-core.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16533", url: "https://www.suse.com/security/cve/CVE-2017-16533", }, { category: "external", summary: "SUSE Bug 1066674 for CVE-2017-16533", url: "https://bugzilla.suse.com/1066674", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2017-16533", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2017-16533", url: "https://bugzilla.suse.com/1146519", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-29T12:13:02Z", details: "moderate", }, ], title: "CVE-2017-16533", }, { cve: "CVE-2017-7273", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7273", }, ], notes: [ { category: "general", text: "The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 3.2 and 4.x before 4.9.4 allows physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7273", url: "https://www.suse.com/security/cve/CVE-2017-7273", }, { category: "external", summary: "SUSE Bug 1031240 for CVE-2017-7273", url: "https://bugzilla.suse.com/1031240", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-29T12:13:02Z", details: "moderate", }, ], title: "CVE-2017-7273", }, { cve: "CVE-2018-18281", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18281", }, ], notes: [ { category: "general", text: "Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. This is fixed in the following kernel versions: 4.9.135, 4.14.78, 4.18.16, 4.19.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18281", url: "https://www.suse.com/security/cve/CVE-2018-18281", }, { category: "external", summary: "SUSE Bug 1113769 for CVE-2018-18281", url: "https://bugzilla.suse.com/1113769", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-29T12:13:02Z", details: "moderate", }, ], title: "CVE-2018-18281", }, { cve: "CVE-2018-18386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18386", }, ], notes: [ { category: "general", text: "drivers/tty/n_tty.c in the Linux kernel before 4.14.11 allows local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18386", url: "https://www.suse.com/security/cve/CVE-2018-18386", }, { category: "external", summary: "SUSE Bug 1094825 for CVE-2018-18386", url: "https://bugzilla.suse.com/1094825", }, { category: "external", summary: "SUSE Bug 1112039 for CVE-2018-18386", url: "https://bugzilla.suse.com/1112039", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-29T12:13:02Z", details: "moderate", }, ], title: "CVE-2018-18386", }, { cve: "CVE-2018-18710", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18710", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18710", url: "https://www.suse.com/security/cve/CVE-2018-18710", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-18710", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-29T12:13:02Z", details: "moderate", }, ], title: "CVE-2018-18710", }, { cve: "CVE-2018-19407", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19407", }, ], notes: [ { category: "general", text: "The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19407", url: "https://www.suse.com/security/cve/CVE-2018-19407", }, { category: "external", summary: "SUSE Bug 1116841 for CVE-2018-19407", url: "https://bugzilla.suse.com/1116841", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-29T12:13:02Z", details: "moderate", }, ], title: "CVE-2018-19407", }, { cve: "CVE-2018-19824", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19824", }, ], notes: [ { category: "general", text: "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19824", url: "https://www.suse.com/security/cve/CVE-2018-19824", }, { category: "external", summary: "SUSE Bug 1118152 for CVE-2018-19824", url: "https://bugzilla.suse.com/1118152", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-29T12:13:02Z", details: "moderate", }, ], title: "CVE-2018-19824", }, { cve: "CVE-2018-19985", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19985", }, ], notes: [ { category: "general", text: "The function hso_get_config_data in drivers/net/usb/hso.c in the Linux kernel through 4.19.8 reads if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allows arbitrary read in the kernel address space.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19985", url: "https://www.suse.com/security/cve/CVE-2018-19985", }, { category: "external", summary: "SUSE Bug 1120743 for CVE-2018-19985", url: "https://bugzilla.suse.com/1120743", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-29T12:13:02Z", details: "low", }, ], title: "CVE-2018-19985", }, { cve: "CVE-2018-20169", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20169", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20169", url: "https://www.suse.com/security/cve/CVE-2018-20169", }, { category: "external", summary: "SUSE Bug 1119714 for CVE-2018-20169", url: "https://bugzilla.suse.com/1119714", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-29T12:13:02Z", details: "moderate", }, ], title: "CVE-2018-20169", }, { cve: "CVE-2018-9516", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-9516", }, ], notes: [ { category: "general", text: "In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-71361580.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-9516", url: "https://www.suse.com/security/cve/CVE-2018-9516", }, { category: "external", summary: "SUSE Bug 1108498 for CVE-2018-9516", url: "https://bugzilla.suse.com/1108498", }, { category: "external", summary: "SUSE Bug 1123161 for CVE-2018-9516", url: "https://bugzilla.suse.com/1123161", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-29T12:13:02Z", details: "moderate", }, ], title: "CVE-2018-9516", }, { cve: "CVE-2018-9568", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-9568", }, ], notes: [ { category: "general", text: "In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-9568", url: "https://www.suse.com/security/cve/CVE-2018-9568", }, { category: "external", summary: "SUSE Bug 1118319 for CVE-2018-9568", url: "https://bugzilla.suse.com/1118319", }, { category: "external", summary: "SUSE Bug 1118320 for CVE-2018-9568", url: "https://bugzilla.suse.com/1118320", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.59.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.59.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-29T12:13:02Z", details: "important", }, ], title: "CVE-2018-9568", }, ], }
suse-su-2019:0439-1
Vulnerability from csaf_suse
Published
2019-02-19 14:35
Modified
2019-02-19 14:35
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-19985: The function hso_probe read if_num from the USB device (as an u8) and used it without a length check to index an array, resulting in an OOB memory read in hso_probe or hso_get_config_data that could be used by local attackers (bnc#1120743).
- CVE-2018-16884: NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bnc#1119946).
- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).
- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bnc#1118319).
- CVE-2018-16862: A security flaw was found in a way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one (bnc#1117186).
- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).
- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).
- CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).
- CVE-2018-18690: A local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE operations with conversion of an attr from short to long form (bnc#1105025).
- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).
- CVE-2018-9516: In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. (bnc#1108498).
- CVE-2019-3459, CVE-2019-3460: The Blutooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).
The following non-security bugs were fixed:
- aio: hold an extra file reference over AIO read/write operations (bsc#1116027).
- ata: Fix racy link clearance (bsc#1107866).
- btrfs: Fix wrong first_key parameter in replace_path (follow up fixes for bsc#1084721).
- cgroup, netclassid: add a preemption point to write_classid (bnc#1098996).
- cifs: Fix infinite loop when using hard mount option (bsc#1091171).
- dm round robin: revert 'use percpu 'repeat_count' and 'current_path'' (bsc#1113192)
- fscache: fix race between enablement and dropping of object (bsc#1107385).
- ibmvnic: fix index in release_rx_pools (bsc#1115440).
- ip: hash fragments consistently (bsc#1042286 bsc#1108145).
- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (bsc#1110286).
- ipv6: set rt6i_protocol properly in the route when it is installed (bsc#1114190).
- ipv6: set rt6i_protocol properly in the route when it is installed (bsc#1114190).
- ixgbe: Add function for checking to see if we can reuse page (bsc#1100105).
- ixgbe: Add support for build_skb (bsc#1100105).
- ixgbe: Add support for padding packet (bsc#1100105).
- ixgbe: Break out Rx buffer page management (bsc#1100105).
- ixgbe: Fix output from ixgbe_dump (bsc#1100105).
- ixgbe: Make use of order 1 pages and 3K buffers independent of FCoE (bsc#1100105).
- ixgbe: Only DMA sync frame length (bsc#1100105).
- ixgbe: Update code to better handle incrementing page count (bsc#1100105).
- ixgbe: Update driver to make use of DMA attributes in Rx path (bsc#1100105).
- ixgbe: Use length to determine if descriptor is done (bsc#1100105).
- libfc: sync strings with upstream versions (bsc#1114763).
- md: reorder flag_bits to match upstream commits The ordering in the patches was backward.
- mm: add support for releasing multiple instances of a page (bsc#1100105).
- mm: rename __page_frag functions to __page_frag_cache, drop order from drain (bsc#1100105).
- net: ipv4: do not handle duplicate fragments as overlapping (bsc#1116345).
- NFS: add nostatflush mount option (bsc#1065726).
- nospec: Include <asm/barrier.h> dependency (bsc#1114648).
- ovl: after setting xattributes, you need to copy the attributes in order to make sure the mode and ctime/mtime is set (bsc#1107299).
- powerpc/boot: Request no dynamic linker for boot wrapper (bsc#1070805).
- Revert 'kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)' This reverts commit 54da5757cbbb39ab15b3cd09cf922a8a9e32209c.
- rps: flow_dissector: Fix uninitialized flow_keys used in __skb_get_hash possibly (bsc#1042286 bsc#1108145).
- scsi: devinfo: apply to HP XP the same flags as Hitachi VSP (bnc#1091197).
- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1103624, bsc#1104731).
- sd: disable logical block provisioning if 'lpbme' is not set (bsc#1086095).
- tcp: prevent bogus FRTO undos with non-SACK flows (bsc#1086535).
- Update ibmvnic: Fix RX queue buffer cleanup (bsc#1115440, bsc#1115433).
- x86/asm/entry/32: Simplify pushes of zeroed pt_regs->REGs (bsc#1105931).
- x86/entry/64: Clear registers for exceptions/interrupts, to reduce speculation attack surface (bsc#1105931).
- x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculation attack surface (bsc#1105931).
- x86/entry/64: sanitize extra registers on syscall entry (bsc#1105931).
- x86/kaiser: Avoid loosing NMIs when using trampoline stack (bsc#1106293 bsc#1099597).
- x86,sched: Allow topologies where NUMA nodes share an LLC (bsc#1091158, bsc#1101555, bsc#1117187).
- xen/blkfront: avoid NULL blkfront_info dereference on device removal (bsc#1111062).
- xen/blkfront: correct purging of persistent grants (bnc#1065600).
- xen: fix race in xen_qlock_wait() (bnc#1107256).
- xen: fix xen_qlock_wait() (bnc#1107256).
- xen: make xen_qlock_wait() nestable (bnc#1107256).
- xen/netback: dont overflow meta array (bnc#1099523).
- xen/netfront: do not bug in case of too many frags (bnc#1012382).
- xen/netfront: do not cache skb_shinfo() (bnc#1012382).
- xen/x86: add diagnostic printout to xen_mc_flush() in case of error (bnc#1116183).
- xfrm: use complete IPv6 addresses for hash (bsc#1109330).
- xfs/dmapi: restore event in xfs_getbmap (bsc#1095344, bsc#1114763).
- xfs: fix quotacheck dquot id overflow infinite loop (bsc#1121621).
Patchnames
SUSE-2019-439,SUSE-OpenStack-Cloud-7-2019-439,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-439,SUSE-SLE-HA-12-SP2-2019-439,SUSE-SLE-SAP-12-SP2-2019-439,SUSE-SLE-SERVER-12-SP2-2019-439,SUSE-SLE-SERVER-12-SP2-BCL-2019-439,SUSE-Storage-4-2019-439
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-19985: The function hso_probe read if_num from the USB device (as an u8) and used it without a length check to index an array, resulting in an OOB memory read in hso_probe or hso_get_config_data that could be used by local attackers (bnc#1120743).\n- CVE-2018-16884: NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bnc#1119946).\n- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).\n- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bnc#1118319).\n- CVE-2018-16862: A security flaw was found in a way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one (bnc#1117186).\n- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).\n- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).\n- CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).\n- CVE-2018-18690: A local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE operations with conversion of an attr from short to long form (bnc#1105025).\n- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).\n- CVE-2018-9516: In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. (bnc#1108498).\n- CVE-2019-3459, CVE-2019-3460: The Blutooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).\n\nThe following non-security bugs were fixed:\n\n- aio: hold an extra file reference over AIO read/write operations (bsc#1116027).\n- ata: Fix racy link clearance (bsc#1107866).\n- btrfs: Fix wrong first_key parameter in replace_path (follow up fixes for bsc#1084721).\n- cgroup, netclassid: add a preemption point to write_classid (bnc#1098996).\n- cifs: Fix infinite loop when using hard mount option (bsc#1091171).\n- dm round robin: revert 'use percpu 'repeat_count' and 'current_path'' (bsc#1113192)\n- fscache: fix race between enablement and dropping of object (bsc#1107385).\n- ibmvnic: fix index in release_rx_pools (bsc#1115440).\n- ip: hash fragments consistently (bsc#1042286 bsc#1108145).\n- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (bsc#1110286).\n- ipv6: set rt6i_protocol properly in the route when it is installed (bsc#1114190).\n- ipv6: set rt6i_protocol properly in the route when it is installed (bsc#1114190).\n- ixgbe: Add function for checking to see if we can reuse page (bsc#1100105).\n- ixgbe: Add support for build_skb (bsc#1100105).\n- ixgbe: Add support for padding packet (bsc#1100105).\n- ixgbe: Break out Rx buffer page management (bsc#1100105).\n- ixgbe: Fix output from ixgbe_dump (bsc#1100105).\n- ixgbe: Make use of order 1 pages and 3K buffers independent of FCoE (bsc#1100105).\n- ixgbe: Only DMA sync frame length (bsc#1100105).\n- ixgbe: Update code to better handle incrementing page count (bsc#1100105).\n- ixgbe: Update driver to make use of DMA attributes in Rx path (bsc#1100105).\n- ixgbe: Use length to determine if descriptor is done (bsc#1100105).\n- libfc: sync strings with upstream versions (bsc#1114763).\n- md: reorder flag_bits to match upstream commits The ordering in the patches was backward.\n- mm: add support for releasing multiple instances of a page (bsc#1100105).\n- mm: rename __page_frag functions to __page_frag_cache, drop order from drain (bsc#1100105).\n- net: ipv4: do not handle duplicate fragments as overlapping (bsc#1116345).\n- NFS: add nostatflush mount option (bsc#1065726).\n- nospec: Include <asm/barrier.h> dependency (bsc#1114648).\n- ovl: after setting xattributes, you need to copy the attributes in order to make sure the mode and ctime/mtime is set (bsc#1107299).\n- powerpc/boot: Request no dynamic linker for boot wrapper (bsc#1070805).\n- Revert 'kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)' This reverts commit 54da5757cbbb39ab15b3cd09cf922a8a9e32209c.\n- rps: flow_dissector: Fix uninitialized flow_keys used in __skb_get_hash possibly (bsc#1042286 bsc#1108145).\n- scsi: devinfo: apply to HP XP the same flags as Hitachi VSP (bnc#1091197).\n- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1103624, bsc#1104731).\n- sd: disable logical block provisioning if 'lpbme' is not set (bsc#1086095).\n- tcp: prevent bogus FRTO undos with non-SACK flows (bsc#1086535).\n- Update ibmvnic: Fix RX queue buffer cleanup (bsc#1115440, bsc#1115433).\n- x86/asm/entry/32: Simplify pushes of zeroed pt_regs->REGs (bsc#1105931).\n- x86/entry/64: Clear registers for exceptions/interrupts, to reduce speculation attack surface (bsc#1105931).\n- x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculation attack surface (bsc#1105931).\n- x86/entry/64: sanitize extra registers on syscall entry (bsc#1105931).\n- x86/kaiser: Avoid loosing NMIs when using trampoline stack (bsc#1106293 bsc#1099597).\n- x86,sched: Allow topologies where NUMA nodes share an LLC (bsc#1091158, bsc#1101555, bsc#1117187).\n- xen/blkfront: avoid NULL blkfront_info dereference on device removal (bsc#1111062).\n- xen/blkfront: correct purging of persistent grants (bnc#1065600).\n- xen: fix race in xen_qlock_wait() (bnc#1107256).\n- xen: fix xen_qlock_wait() (bnc#1107256).\n- xen: make xen_qlock_wait() nestable (bnc#1107256).\n- xen/netback: dont overflow meta array (bnc#1099523).\n- xen/netfront: do not bug in case of too many frags (bnc#1012382).\n- xen/netfront: do not cache skb_shinfo() (bnc#1012382).\n- xen/x86: add diagnostic printout to xen_mc_flush() in case of error (bnc#1116183).\n- xfrm: use complete IPv6 addresses for hash (bsc#1109330).\n- xfs/dmapi: restore event in xfs_getbmap (bsc#1095344, bsc#1114763).\n- xfs: fix quotacheck dquot id overflow infinite loop (bsc#1121621).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-439,SUSE-OpenStack-Cloud-7-2019-439,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-439,SUSE-SLE-HA-12-SP2-2019-439,SUSE-SLE-SAP-12-SP2-2019-439,SUSE-SLE-SERVER-12-SP2-2019-439,SUSE-SLE-SERVER-12-SP2-BCL-2019-439,SUSE-Storage-4-2019-439", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0439-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:0439-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20190439-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:0439-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html", }, { category: "self", summary: "SUSE Bug 1012382", url: "https://bugzilla.suse.com/1012382", }, { category: "self", summary: "SUSE Bug 1023175", url: "https://bugzilla.suse.com/1023175", }, { category: "self", summary: "SUSE Bug 1042286", url: "https://bugzilla.suse.com/1042286", }, { category: "self", summary: "SUSE Bug 1065600", url: "https://bugzilla.suse.com/1065600", }, { category: "self", summary: "SUSE Bug 1065726", url: "https://bugzilla.suse.com/1065726", }, { category: "self", summary: "SUSE Bug 1070805", url: "https://bugzilla.suse.com/1070805", }, { category: "self", summary: "SUSE Bug 1084721", url: "https://bugzilla.suse.com/1084721", }, { category: "self", summary: "SUSE Bug 1086095", url: "https://bugzilla.suse.com/1086095", }, { category: "self", summary: "SUSE Bug 1086535", url: "https://bugzilla.suse.com/1086535", }, { category: "self", summary: "SUSE Bug 1091158", url: "https://bugzilla.suse.com/1091158", }, { category: "self", summary: "SUSE Bug 1091171", url: "https://bugzilla.suse.com/1091171", }, { category: "self", summary: "SUSE Bug 1091197", url: "https://bugzilla.suse.com/1091197", }, { category: "self", summary: "SUSE Bug 1094825", url: "https://bugzilla.suse.com/1094825", }, { category: "self", summary: "SUSE Bug 1095344", url: "https://bugzilla.suse.com/1095344", }, { category: "self", summary: "SUSE Bug 1098996", url: "https://bugzilla.suse.com/1098996", }, { category: "self", summary: "SUSE Bug 1099523", url: "https://bugzilla.suse.com/1099523", }, { category: "self", summary: "SUSE Bug 1099597", url: "https://bugzilla.suse.com/1099597", }, { category: "self", summary: "SUSE Bug 1100105", url: "https://bugzilla.suse.com/1100105", }, { category: "self", summary: "SUSE Bug 1101555", url: "https://bugzilla.suse.com/1101555", }, { category: "self", summary: "SUSE Bug 1103624", url: "https://bugzilla.suse.com/1103624", }, { category: "self", summary: "SUSE Bug 1104731", url: "https://bugzilla.suse.com/1104731", }, { category: "self", summary: "SUSE Bug 1105025", url: "https://bugzilla.suse.com/1105025", }, { category: "self", summary: "SUSE Bug 1105931", url: "https://bugzilla.suse.com/1105931", }, { category: "self", summary: "SUSE Bug 1106293", url: "https://bugzilla.suse.com/1106293", }, { category: "self", summary: "SUSE Bug 1107256", url: "https://bugzilla.suse.com/1107256", }, { category: "self", summary: "SUSE Bug 1107299", url: "https://bugzilla.suse.com/1107299", }, { category: "self", summary: "SUSE Bug 1107385", url: "https://bugzilla.suse.com/1107385", }, { category: "self", summary: "SUSE Bug 1107866", url: "https://bugzilla.suse.com/1107866", }, { category: "self", summary: "SUSE Bug 1108145", url: "https://bugzilla.suse.com/1108145", }, { category: "self", summary: "SUSE Bug 1108498", url: "https://bugzilla.suse.com/1108498", }, { category: "self", summary: "SUSE Bug 1109330", url: "https://bugzilla.suse.com/1109330", }, { category: "self", summary: "SUSE Bug 1110286", url: "https://bugzilla.suse.com/1110286", }, { category: "self", summary: "SUSE Bug 1110837", url: "https://bugzilla.suse.com/1110837", }, { category: "self", summary: "SUSE Bug 1111062", url: "https://bugzilla.suse.com/1111062", }, { category: "self", summary: "SUSE Bug 1113192", url: "https://bugzilla.suse.com/1113192", }, { category: "self", summary: "SUSE Bug 1113751", url: "https://bugzilla.suse.com/1113751", }, { category: "self", summary: "SUSE Bug 1113769", url: "https://bugzilla.suse.com/1113769", }, { category: "self", summary: "SUSE Bug 1114190", url: "https://bugzilla.suse.com/1114190", }, { category: "self", summary: "SUSE Bug 1114648", url: "https://bugzilla.suse.com/1114648", }, { category: "self", summary: "SUSE Bug 1114763", url: "https://bugzilla.suse.com/1114763", }, { category: "self", summary: "SUSE Bug 1115433", url: "https://bugzilla.suse.com/1115433", }, { category: "self", summary: "SUSE Bug 1115440", url: "https://bugzilla.suse.com/1115440", }, { category: "self", summary: "SUSE Bug 1116027", url: "https://bugzilla.suse.com/1116027", }, { category: "self", summary: "SUSE Bug 1116183", url: "https://bugzilla.suse.com/1116183", }, { category: "self", summary: "SUSE Bug 1116345", url: "https://bugzilla.suse.com/1116345", }, { category: "self", summary: "SUSE Bug 1117186", url: "https://bugzilla.suse.com/1117186", }, { category: "self", summary: "SUSE Bug 1117187", url: "https://bugzilla.suse.com/1117187", }, { category: "self", summary: "SUSE Bug 1118152", url: "https://bugzilla.suse.com/1118152", }, { category: "self", summary: "SUSE Bug 1118319", url: "https://bugzilla.suse.com/1118319", }, { category: "self", summary: "SUSE Bug 1119714", url: "https://bugzilla.suse.com/1119714", }, { category: "self", summary: "SUSE Bug 1119946", url: "https://bugzilla.suse.com/1119946", }, { category: "self", summary: "SUSE Bug 1119947", url: "https://bugzilla.suse.com/1119947", }, { category: "self", summary: "SUSE Bug 1120743", url: "https://bugzilla.suse.com/1120743", }, { category: "self", summary: "SUSE Bug 1120758", url: "https://bugzilla.suse.com/1120758", }, { category: "self", summary: "SUSE Bug 1121621", url: "https://bugzilla.suse.com/1121621", }, { category: "self", summary: "SUSE Bug 1123161", url: "https://bugzilla.suse.com/1123161", }, { category: "self", summary: "SUSE CVE CVE-2018-16862 page", url: "https://www.suse.com/security/cve/CVE-2018-16862/", }, { category: "self", summary: "SUSE CVE CVE-2018-16884 page", url: "https://www.suse.com/security/cve/CVE-2018-16884/", }, { category: "self", summary: "SUSE CVE CVE-2018-18281 page", url: "https://www.suse.com/security/cve/CVE-2018-18281/", }, { category: "self", summary: "SUSE CVE CVE-2018-18386 page", url: "https://www.suse.com/security/cve/CVE-2018-18386/", }, { category: "self", summary: "SUSE CVE CVE-2018-18690 page", url: "https://www.suse.com/security/cve/CVE-2018-18690/", }, { category: "self", summary: "SUSE CVE CVE-2018-18710 page", url: "https://www.suse.com/security/cve/CVE-2018-18710/", }, { category: "self", summary: "SUSE CVE CVE-2018-19824 page", url: "https://www.suse.com/security/cve/CVE-2018-19824/", }, { category: "self", summary: "SUSE CVE CVE-2018-19985 page", url: "https://www.suse.com/security/cve/CVE-2018-19985/", }, { category: "self", summary: "SUSE CVE CVE-2018-20169 page", url: "https://www.suse.com/security/cve/CVE-2018-20169/", }, { category: "self", summary: "SUSE CVE CVE-2018-9516 page", url: "https://www.suse.com/security/cve/CVE-2018-9516/", }, { category: "self", summary: "SUSE CVE CVE-2018-9568 page", url: "https://www.suse.com/security/cve/CVE-2018-9568/", }, { category: "self", summary: "SUSE CVE CVE-2019-3459 page", url: "https://www.suse.com/security/cve/CVE-2019-3459/", }, { category: "self", summary: "SUSE CVE CVE-2019-3460 page", url: "https://www.suse.com/security/cve/CVE-2019-3460/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2019-02-19T14:35:53Z", generator: { date: "2019-02-19T14:35:53Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:0439-1", initial_release_date: "2019-02-19T14:35:53Z", revision_history: [ { date: "2019-02-19T14:35:53Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.4.121-92.101.1.aarch64", product: { name: "cluster-md-kmp-default-4.4.121-92.101.1.aarch64", product_id: "cluster-md-kmp-default-4.4.121-92.101.1.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-vanilla-4.4.121-92.101.1.aarch64", product: { name: "cluster-md-kmp-vanilla-4.4.121-92.101.1.aarch64", product_id: "cluster-md-kmp-vanilla-4.4.121-92.101.1.aarch64", }, }, { category: "product_version", name: "cluster-network-kmp-default-4.4.121-92.101.1.aarch64", product: { name: "cluster-network-kmp-default-4.4.121-92.101.1.aarch64", product_id: "cluster-network-kmp-default-4.4.121-92.101.1.aarch64", }, }, { category: "product_version", name: "cluster-network-kmp-vanilla-4.4.121-92.101.1.aarch64", product: { name: "cluster-network-kmp-vanilla-4.4.121-92.101.1.aarch64", product_id: "cluster-network-kmp-vanilla-4.4.121-92.101.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-4.4.121-92.101.1.aarch64", product: { name: "dlm-kmp-default-4.4.121-92.101.1.aarch64", product_id: "dlm-kmp-default-4.4.121-92.101.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-vanilla-4.4.121-92.101.1.aarch64", product: { name: "dlm-kmp-vanilla-4.4.121-92.101.1.aarch64", product_id: "dlm-kmp-vanilla-4.4.121-92.101.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.4.121-92.101.1.aarch64", product: { name: "gfs2-kmp-default-4.4.121-92.101.1.aarch64", product_id: "gfs2-kmp-default-4.4.121-92.101.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-vanilla-4.4.121-92.101.1.aarch64", product: { name: "gfs2-kmp-vanilla-4.4.121-92.101.1.aarch64", product_id: "gfs2-kmp-vanilla-4.4.121-92.101.1.aarch64", }, }, { category: "product_version", name: "kernel-default-4.4.121-92.101.1.aarch64", product: { name: "kernel-default-4.4.121-92.101.1.aarch64", product_id: "kernel-default-4.4.121-92.101.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-4.4.121-92.101.1.aarch64", product: { name: "kernel-default-base-4.4.121-92.101.1.aarch64", product_id: "kernel-default-base-4.4.121-92.101.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-4.4.121-92.101.1.aarch64", product: { name: "kernel-default-devel-4.4.121-92.101.1.aarch64", product_id: "kernel-default-devel-4.4.121-92.101.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-4.4.121-92.101.1.aarch64", product: { name: "kernel-default-extra-4.4.121-92.101.1.aarch64", product_id: "kernel-default-extra-4.4.121-92.101.1.aarch64", }, }, { category: "product_version", name: "kernel-default-kgraft-4.4.121-92.101.1.aarch64", product: { name: "kernel-default-kgraft-4.4.121-92.101.1.aarch64", product_id: "kernel-default-kgraft-4.4.121-92.101.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-4.4.121-92.101.1.aarch64", product: { name: "kernel-obs-build-4.4.121-92.101.1.aarch64", product_id: "kernel-obs-build-4.4.121-92.101.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-4.4.121-92.101.1.aarch64", product: { name: "kernel-obs-qa-4.4.121-92.101.1.aarch64", product_id: "kernel-obs-qa-4.4.121-92.101.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-4.4.121-92.101.1.aarch64", product: { name: "kernel-syms-4.4.121-92.101.1.aarch64", product_id: "kernel-syms-4.4.121-92.101.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-4.4.121-92.101.1.aarch64", product: { name: "kernel-vanilla-4.4.121-92.101.1.aarch64", product_id: "kernel-vanilla-4.4.121-92.101.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.4.121-92.101.1.aarch64", product: { name: "kernel-vanilla-base-4.4.121-92.101.1.aarch64", product_id: "kernel-vanilla-base-4.4.121-92.101.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.4.121-92.101.1.aarch64", product: { name: "kernel-vanilla-devel-4.4.121-92.101.1.aarch64", product_id: "kernel-vanilla-devel-4.4.121-92.101.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.4.121-92.101.1.aarch64", product: { name: "ocfs2-kmp-default-4.4.121-92.101.1.aarch64", product_id: "ocfs2-kmp-default-4.4.121-92.101.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-vanilla-4.4.121-92.101.1.aarch64", product: { name: "ocfs2-kmp-vanilla-4.4.121-92.101.1.aarch64", product_id: "ocfs2-kmp-vanilla-4.4.121-92.101.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-4.4.121-92.101.1.noarch", product: { name: "kernel-devel-4.4.121-92.101.1.noarch", product_id: "kernel-devel-4.4.121-92.101.1.noarch", }, }, { category: "product_version", name: "kernel-docs-4.4.121-92.101.1.noarch", product: { name: "kernel-docs-4.4.121-92.101.1.noarch", product_id: "kernel-docs-4.4.121-92.101.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-4.4.121-92.101.1.noarch", product: { name: "kernel-docs-html-4.4.121-92.101.1.noarch", product_id: "kernel-docs-html-4.4.121-92.101.1.noarch", }, }, { category: "product_version", name: "kernel-docs-pdf-4.4.121-92.101.1.noarch", product: { name: "kernel-docs-pdf-4.4.121-92.101.1.noarch", product_id: "kernel-docs-pdf-4.4.121-92.101.1.noarch", }, }, { category: "product_version", name: "kernel-macros-4.4.121-92.101.1.noarch", product: { name: "kernel-macros-4.4.121-92.101.1.noarch", product_id: "kernel-macros-4.4.121-92.101.1.noarch", }, }, { category: "product_version", name: "kernel-source-4.4.121-92.101.1.noarch", product: { name: "kernel-source-4.4.121-92.101.1.noarch", product_id: "kernel-source-4.4.121-92.101.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-4.4.121-92.101.1.noarch", product: { name: "kernel-source-vanilla-4.4.121-92.101.1.noarch", product_id: "kernel-source-vanilla-4.4.121-92.101.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-debug-4.4.121-92.101.1.ppc64le", product: { name: "cluster-md-kmp-debug-4.4.121-92.101.1.ppc64le", product_id: "cluster-md-kmp-debug-4.4.121-92.101.1.ppc64le", }, }, { category: "product_version", name: "cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", product: { name: "cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", product_id: "cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", }, }, { category: "product_version", name: "cluster-md-kmp-vanilla-4.4.121-92.101.1.ppc64le", product: { name: "cluster-md-kmp-vanilla-4.4.121-92.101.1.ppc64le", product_id: "cluster-md-kmp-vanilla-4.4.121-92.101.1.ppc64le", }, }, { category: "product_version", name: "cluster-network-kmp-debug-4.4.121-92.101.1.ppc64le", product: { name: "cluster-network-kmp-debug-4.4.121-92.101.1.ppc64le", product_id: "cluster-network-kmp-debug-4.4.121-92.101.1.ppc64le", }, }, { category: "product_version", name: "cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", product: { name: "cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", product_id: "cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", }, }, { category: "product_version", name: "cluster-network-kmp-vanilla-4.4.121-92.101.1.ppc64le", product: { name: "cluster-network-kmp-vanilla-4.4.121-92.101.1.ppc64le", product_id: "cluster-network-kmp-vanilla-4.4.121-92.101.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-debug-4.4.121-92.101.1.ppc64le", product: { name: "dlm-kmp-debug-4.4.121-92.101.1.ppc64le", product_id: "dlm-kmp-debug-4.4.121-92.101.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-4.4.121-92.101.1.ppc64le", product: { name: "dlm-kmp-default-4.4.121-92.101.1.ppc64le", product_id: "dlm-kmp-default-4.4.121-92.101.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-vanilla-4.4.121-92.101.1.ppc64le", product: { name: "dlm-kmp-vanilla-4.4.121-92.101.1.ppc64le", product_id: "dlm-kmp-vanilla-4.4.121-92.101.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-debug-4.4.121-92.101.1.ppc64le", product: { name: "gfs2-kmp-debug-4.4.121-92.101.1.ppc64le", product_id: "gfs2-kmp-debug-4.4.121-92.101.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-4.4.121-92.101.1.ppc64le", product: { name: "gfs2-kmp-default-4.4.121-92.101.1.ppc64le", product_id: "gfs2-kmp-default-4.4.121-92.101.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-vanilla-4.4.121-92.101.1.ppc64le", product: { name: "gfs2-kmp-vanilla-4.4.121-92.101.1.ppc64le", product_id: "gfs2-kmp-vanilla-4.4.121-92.101.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-4.4.121-92.101.1.ppc64le", product: { name: "kernel-debug-4.4.121-92.101.1.ppc64le", product_id: "kernel-debug-4.4.121-92.101.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-base-4.4.121-92.101.1.ppc64le", product: { name: "kernel-debug-base-4.4.121-92.101.1.ppc64le", product_id: "kernel-debug-base-4.4.121-92.101.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-4.4.121-92.101.1.ppc64le", product: { name: "kernel-debug-devel-4.4.121-92.101.1.ppc64le", product_id: "kernel-debug-devel-4.4.121-92.101.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-extra-4.4.121-92.101.1.ppc64le", product: { name: "kernel-debug-extra-4.4.121-92.101.1.ppc64le", product_id: "kernel-debug-extra-4.4.121-92.101.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-kgraft-4.4.121-92.101.1.ppc64le", product: { name: "kernel-debug-kgraft-4.4.121-92.101.1.ppc64le", product_id: "kernel-debug-kgraft-4.4.121-92.101.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-4.4.121-92.101.1.ppc64le", product: { name: "kernel-default-4.4.121-92.101.1.ppc64le", product_id: "kernel-default-4.4.121-92.101.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-4.4.121-92.101.1.ppc64le", product: { name: "kernel-default-base-4.4.121-92.101.1.ppc64le", product_id: "kernel-default-base-4.4.121-92.101.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-4.4.121-92.101.1.ppc64le", product: { name: "kernel-default-devel-4.4.121-92.101.1.ppc64le", product_id: "kernel-default-devel-4.4.121-92.101.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-4.4.121-92.101.1.ppc64le", product: { name: "kernel-default-extra-4.4.121-92.101.1.ppc64le", product_id: "kernel-default-extra-4.4.121-92.101.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-kgraft-4.4.121-92.101.1.ppc64le", product: { name: "kernel-default-kgraft-4.4.121-92.101.1.ppc64le", product_id: "kernel-default-kgraft-4.4.121-92.101.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-4.4.121-92.101.1.ppc64le", product: { name: "kernel-obs-build-4.4.121-92.101.1.ppc64le", product_id: "kernel-obs-build-4.4.121-92.101.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-4.4.121-92.101.1.ppc64le", product: { name: "kernel-obs-qa-4.4.121-92.101.1.ppc64le", product_id: "kernel-obs-qa-4.4.121-92.101.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-4.4.121-92.101.1.ppc64le", product: { name: "kernel-syms-4.4.121-92.101.1.ppc64le", product_id: "kernel-syms-4.4.121-92.101.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-4.4.121-92.101.1.ppc64le", product: { name: "kernel-vanilla-4.4.121-92.101.1.ppc64le", product_id: "kernel-vanilla-4.4.121-92.101.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-base-4.4.121-92.101.1.ppc64le", product: { name: "kernel-vanilla-base-4.4.121-92.101.1.ppc64le", product_id: "kernel-vanilla-base-4.4.121-92.101.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.4.121-92.101.1.ppc64le", product: { name: "kernel-vanilla-devel-4.4.121-92.101.1.ppc64le", product_id: "kernel-vanilla-devel-4.4.121-92.101.1.ppc64le", }, }, { category: "product_version", name: "kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", product: { name: "kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", product_id: "kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-debug-4.4.121-92.101.1.ppc64le", product: { name: "ocfs2-kmp-debug-4.4.121-92.101.1.ppc64le", product_id: "ocfs2-kmp-debug-4.4.121-92.101.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", product: { name: "ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", product_id: "ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-vanilla-4.4.121-92.101.1.ppc64le", product: { name: "ocfs2-kmp-vanilla-4.4.121-92.101.1.ppc64le", product_id: "ocfs2-kmp-vanilla-4.4.121-92.101.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.4.121-92.101.1.s390x", product: { name: "cluster-md-kmp-default-4.4.121-92.101.1.s390x", product_id: "cluster-md-kmp-default-4.4.121-92.101.1.s390x", }, }, { category: "product_version", name: "cluster-md-kmp-vanilla-4.4.121-92.101.1.s390x", product: { name: "cluster-md-kmp-vanilla-4.4.121-92.101.1.s390x", product_id: "cluster-md-kmp-vanilla-4.4.121-92.101.1.s390x", }, }, { category: "product_version", name: "cluster-network-kmp-default-4.4.121-92.101.1.s390x", product: { name: "cluster-network-kmp-default-4.4.121-92.101.1.s390x", product_id: "cluster-network-kmp-default-4.4.121-92.101.1.s390x", }, }, { category: "product_version", name: "cluster-network-kmp-vanilla-4.4.121-92.101.1.s390x", product: { name: "cluster-network-kmp-vanilla-4.4.121-92.101.1.s390x", product_id: "cluster-network-kmp-vanilla-4.4.121-92.101.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-4.4.121-92.101.1.s390x", product: { name: "dlm-kmp-default-4.4.121-92.101.1.s390x", product_id: "dlm-kmp-default-4.4.121-92.101.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-vanilla-4.4.121-92.101.1.s390x", product: { name: "dlm-kmp-vanilla-4.4.121-92.101.1.s390x", product_id: "dlm-kmp-vanilla-4.4.121-92.101.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-4.4.121-92.101.1.s390x", product: { name: "gfs2-kmp-default-4.4.121-92.101.1.s390x", product_id: "gfs2-kmp-default-4.4.121-92.101.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-vanilla-4.4.121-92.101.1.s390x", product: { name: "gfs2-kmp-vanilla-4.4.121-92.101.1.s390x", product_id: "gfs2-kmp-vanilla-4.4.121-92.101.1.s390x", }, }, { category: "product_version", name: "kernel-default-4.4.121-92.101.1.s390x", product: { name: "kernel-default-4.4.121-92.101.1.s390x", product_id: "kernel-default-4.4.121-92.101.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-4.4.121-92.101.1.s390x", product: { name: "kernel-default-base-4.4.121-92.101.1.s390x", product_id: "kernel-default-base-4.4.121-92.101.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-4.4.121-92.101.1.s390x", product: { name: "kernel-default-devel-4.4.121-92.101.1.s390x", product_id: "kernel-default-devel-4.4.121-92.101.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-4.4.121-92.101.1.s390x", product: { name: "kernel-default-extra-4.4.121-92.101.1.s390x", product_id: "kernel-default-extra-4.4.121-92.101.1.s390x", }, }, { category: "product_version", name: "kernel-default-kgraft-4.4.121-92.101.1.s390x", product: { name: "kernel-default-kgraft-4.4.121-92.101.1.s390x", product_id: "kernel-default-kgraft-4.4.121-92.101.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-4.4.121-92.101.1.s390x", product: { name: "kernel-default-man-4.4.121-92.101.1.s390x", product_id: "kernel-default-man-4.4.121-92.101.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-4.4.121-92.101.1.s390x", product: { name: "kernel-obs-build-4.4.121-92.101.1.s390x", product_id: "kernel-obs-build-4.4.121-92.101.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-4.4.121-92.101.1.s390x", product: { name: "kernel-obs-qa-4.4.121-92.101.1.s390x", product_id: "kernel-obs-qa-4.4.121-92.101.1.s390x", }, }, { category: "product_version", name: "kernel-syms-4.4.121-92.101.1.s390x", product: { name: "kernel-syms-4.4.121-92.101.1.s390x", product_id: "kernel-syms-4.4.121-92.101.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-4.4.121-92.101.1.s390x", product: { name: "kernel-vanilla-4.4.121-92.101.1.s390x", product_id: "kernel-vanilla-4.4.121-92.101.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-base-4.4.121-92.101.1.s390x", product: { name: "kernel-vanilla-base-4.4.121-92.101.1.s390x", product_id: "kernel-vanilla-base-4.4.121-92.101.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.4.121-92.101.1.s390x", product: { name: "kernel-vanilla-devel-4.4.121-92.101.1.s390x", product_id: "kernel-vanilla-devel-4.4.121-92.101.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-4.4.121-92.101.1.s390x", product: { name: "kernel-zfcpdump-4.4.121-92.101.1.s390x", product_id: "kernel-zfcpdump-4.4.121-92.101.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.4.121-92.101.1.s390x", product: { name: "ocfs2-kmp-default-4.4.121-92.101.1.s390x", product_id: "ocfs2-kmp-default-4.4.121-92.101.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-vanilla-4.4.121-92.101.1.s390x", product: { name: "ocfs2-kmp-vanilla-4.4.121-92.101.1.s390x", product_id: "ocfs2-kmp-vanilla-4.4.121-92.101.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-debug-4.4.121-92.101.1.x86_64", product: { name: "cluster-md-kmp-debug-4.4.121-92.101.1.x86_64", product_id: "cluster-md-kmp-debug-4.4.121-92.101.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-default-4.4.121-92.101.1.x86_64", product: { name: "cluster-md-kmp-default-4.4.121-92.101.1.x86_64", product_id: "cluster-md-kmp-default-4.4.121-92.101.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-vanilla-4.4.121-92.101.1.x86_64", product: { name: "cluster-md-kmp-vanilla-4.4.121-92.101.1.x86_64", product_id: "cluster-md-kmp-vanilla-4.4.121-92.101.1.x86_64", }, }, { category: "product_version", name: "cluster-network-kmp-debug-4.4.121-92.101.1.x86_64", product: { name: "cluster-network-kmp-debug-4.4.121-92.101.1.x86_64", product_id: "cluster-network-kmp-debug-4.4.121-92.101.1.x86_64", }, }, { category: "product_version", name: "cluster-network-kmp-default-4.4.121-92.101.1.x86_64", product: { name: "cluster-network-kmp-default-4.4.121-92.101.1.x86_64", product_id: "cluster-network-kmp-default-4.4.121-92.101.1.x86_64", }, }, { category: "product_version", name: "cluster-network-kmp-vanilla-4.4.121-92.101.1.x86_64", product: { name: "cluster-network-kmp-vanilla-4.4.121-92.101.1.x86_64", product_id: "cluster-network-kmp-vanilla-4.4.121-92.101.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-debug-4.4.121-92.101.1.x86_64", product: { name: "dlm-kmp-debug-4.4.121-92.101.1.x86_64", product_id: "dlm-kmp-debug-4.4.121-92.101.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-4.4.121-92.101.1.x86_64", product: { name: "dlm-kmp-default-4.4.121-92.101.1.x86_64", product_id: "dlm-kmp-default-4.4.121-92.101.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-vanilla-4.4.121-92.101.1.x86_64", product: { name: "dlm-kmp-vanilla-4.4.121-92.101.1.x86_64", product_id: "dlm-kmp-vanilla-4.4.121-92.101.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-debug-4.4.121-92.101.1.x86_64", product: { name: "gfs2-kmp-debug-4.4.121-92.101.1.x86_64", product_id: "gfs2-kmp-debug-4.4.121-92.101.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.4.121-92.101.1.x86_64", product: { name: "gfs2-kmp-default-4.4.121-92.101.1.x86_64", product_id: "gfs2-kmp-default-4.4.121-92.101.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-vanilla-4.4.121-92.101.1.x86_64", product: { name: "gfs2-kmp-vanilla-4.4.121-92.101.1.x86_64", product_id: "gfs2-kmp-vanilla-4.4.121-92.101.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-4.4.121-92.101.1.x86_64", product: { name: "kernel-debug-4.4.121-92.101.1.x86_64", product_id: "kernel-debug-4.4.121-92.101.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-base-4.4.121-92.101.1.x86_64", product: { name: "kernel-debug-base-4.4.121-92.101.1.x86_64", product_id: "kernel-debug-base-4.4.121-92.101.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-4.4.121-92.101.1.x86_64", product: { name: "kernel-debug-devel-4.4.121-92.101.1.x86_64", product_id: "kernel-debug-devel-4.4.121-92.101.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-extra-4.4.121-92.101.1.x86_64", product: { name: "kernel-debug-extra-4.4.121-92.101.1.x86_64", product_id: "kernel-debug-extra-4.4.121-92.101.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-kgraft-4.4.121-92.101.1.x86_64", product: { name: "kernel-debug-kgraft-4.4.121-92.101.1.x86_64", product_id: "kernel-debug-kgraft-4.4.121-92.101.1.x86_64", }, }, { category: "product_version", name: "kernel-default-4.4.121-92.101.1.x86_64", product: { name: "kernel-default-4.4.121-92.101.1.x86_64", product_id: "kernel-default-4.4.121-92.101.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-4.4.121-92.101.1.x86_64", product: { name: "kernel-default-base-4.4.121-92.101.1.x86_64", product_id: "kernel-default-base-4.4.121-92.101.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-4.4.121-92.101.1.x86_64", product: { name: "kernel-default-devel-4.4.121-92.101.1.x86_64", product_id: "kernel-default-devel-4.4.121-92.101.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-4.4.121-92.101.1.x86_64", product: { name: "kernel-default-extra-4.4.121-92.101.1.x86_64", product_id: "kernel-default-extra-4.4.121-92.101.1.x86_64", }, }, { category: "product_version", name: "kernel-default-kgraft-4.4.121-92.101.1.x86_64", product: { name: "kernel-default-kgraft-4.4.121-92.101.1.x86_64", product_id: "kernel-default-kgraft-4.4.121-92.101.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-4.4.121-92.101.1.x86_64", product: { name: "kernel-obs-build-4.4.121-92.101.1.x86_64", product_id: "kernel-obs-build-4.4.121-92.101.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-4.4.121-92.101.1.x86_64", product: { name: "kernel-obs-qa-4.4.121-92.101.1.x86_64", product_id: "kernel-obs-qa-4.4.121-92.101.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-4.4.121-92.101.1.x86_64", product: { name: "kernel-syms-4.4.121-92.101.1.x86_64", product_id: "kernel-syms-4.4.121-92.101.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-4.4.121-92.101.1.x86_64", product: { name: "kernel-vanilla-4.4.121-92.101.1.x86_64", product_id: "kernel-vanilla-4.4.121-92.101.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.4.121-92.101.1.x86_64", product: { name: "kernel-vanilla-base-4.4.121-92.101.1.x86_64", product_id: "kernel-vanilla-base-4.4.121-92.101.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.4.121-92.101.1.x86_64", product: { name: "kernel-vanilla-devel-4.4.121-92.101.1.x86_64", product_id: "kernel-vanilla-devel-4.4.121-92.101.1.x86_64", }, }, { category: "product_version", name: "kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", product: { name: "kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", product_id: "kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-debug-4.4.121-92.101.1.x86_64", product: { name: "ocfs2-kmp-debug-4.4.121-92.101.1.x86_64", product_id: "ocfs2-kmp-debug-4.4.121-92.101.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.4.121-92.101.1.x86_64", product: { name: "ocfs2-kmp-default-4.4.121-92.101.1.x86_64", product_id: "ocfs2-kmp-default-4.4.121-92.101.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-vanilla-4.4.121-92.101.1.x86_64", product: { name: "ocfs2-kmp-vanilla-4.4.121-92.101.1.x86_64", product_id: "ocfs2-kmp-vanilla-4.4.121-92.101.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE OpenStack Cloud 7", product: { name: "SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:7", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 12 SP2", product: { name: "SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp2", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 4", product: { name: "SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4", product_identification_helper: { cpe: "cpe:/o:suse:ses:4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.101.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", }, product_reference: "kernel-default-4.4.121-92.101.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.101.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", }, product_reference: "kernel-default-4.4.121-92.101.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.101.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", }, product_reference: "kernel-default-base-4.4.121-92.101.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.101.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", }, product_reference: "kernel-default-base-4.4.121-92.101.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.101.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", }, product_reference: "kernel-default-devel-4.4.121-92.101.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.101.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", }, product_reference: "kernel-default-devel-4.4.121-92.101.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.4.121-92.101.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", }, product_reference: "kernel-default-man-4.4.121-92.101.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.121-92.101.1.noarch as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", }, product_reference: "kernel-devel-4.4.121-92.101.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.121-92.101.1.noarch as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", }, product_reference: "kernel-macros-4.4.121-92.101.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.121-92.101.1.noarch as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", }, product_reference: "kernel-source-4.4.121-92.101.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.101.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", }, product_reference: "kernel-syms-4.4.121-92.101.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.101.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", }, product_reference: "kernel-syms-4.4.121-92.101.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.4.121-92.101.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", }, product_reference: "cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.4.121-92.101.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", }, product_reference: "cluster-md-kmp-default-4.4.121-92.101.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", }, product_reference: "cluster-md-kmp-default-4.4.121-92.101.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-network-kmp-default-4.4.121-92.101.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", }, product_reference: "cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-network-kmp-default-4.4.121-92.101.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", }, product_reference: "cluster-network-kmp-default-4.4.121-92.101.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-network-kmp-default-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", }, product_reference: "cluster-network-kmp-default-4.4.121-92.101.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.4.121-92.101.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", }, product_reference: "dlm-kmp-default-4.4.121-92.101.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.4.121-92.101.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", }, product_reference: "dlm-kmp-default-4.4.121-92.101.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", }, product_reference: "dlm-kmp-default-4.4.121-92.101.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.4.121-92.101.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", }, product_reference: "gfs2-kmp-default-4.4.121-92.101.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.4.121-92.101.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", }, product_reference: "gfs2-kmp-default-4.4.121-92.101.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", }, product_reference: "gfs2-kmp-default-4.4.121-92.101.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.4.121-92.101.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", }, product_reference: "ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.4.121-92.101.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", }, product_reference: "ocfs2-kmp-default-4.4.121-92.101.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", }, product_reference: "ocfs2-kmp-default-4.4.121-92.101.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.101.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", }, product_reference: "kernel-default-4.4.121-92.101.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", }, product_reference: "kernel-default-4.4.121-92.101.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.101.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", }, product_reference: "kernel-default-base-4.4.121-92.101.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", }, product_reference: "kernel-default-base-4.4.121-92.101.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.101.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", }, product_reference: "kernel-default-devel-4.4.121-92.101.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", }, product_reference: "kernel-default-devel-4.4.121-92.101.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.121-92.101.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", }, product_reference: "kernel-devel-4.4.121-92.101.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.121-92.101.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", }, product_reference: "kernel-macros-4.4.121-92.101.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.121-92.101.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", }, product_reference: "kernel-source-4.4.121-92.101.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.101.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", }, product_reference: "kernel-syms-4.4.121-92.101.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", }, product_reference: "kernel-syms-4.4.121-92.101.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", }, product_reference: "kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.101.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", }, product_reference: "kernel-default-4.4.121-92.101.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.101.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", }, product_reference: "kernel-default-4.4.121-92.101.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", }, product_reference: "kernel-default-4.4.121-92.101.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.101.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", }, product_reference: "kernel-default-base-4.4.121-92.101.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.101.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", }, product_reference: "kernel-default-base-4.4.121-92.101.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", }, product_reference: "kernel-default-base-4.4.121-92.101.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.101.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", }, product_reference: "kernel-default-devel-4.4.121-92.101.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.101.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", }, product_reference: "kernel-default-devel-4.4.121-92.101.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", }, product_reference: "kernel-default-devel-4.4.121-92.101.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.4.121-92.101.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", }, product_reference: "kernel-default-man-4.4.121-92.101.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.121-92.101.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", }, product_reference: "kernel-devel-4.4.121-92.101.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.121-92.101.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", }, product_reference: "kernel-macros-4.4.121-92.101.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.121-92.101.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", }, product_reference: "kernel-source-4.4.121-92.101.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.101.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", }, product_reference: "kernel-syms-4.4.121-92.101.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.101.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", }, product_reference: "kernel-syms-4.4.121-92.101.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", }, product_reference: "kernel-syms-4.4.121-92.101.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", }, product_reference: "kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", }, product_reference: "kernel-default-4.4.121-92.101.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", }, product_reference: "kernel-default-base-4.4.121-92.101.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", }, product_reference: "kernel-default-devel-4.4.121-92.101.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.121-92.101.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", }, product_reference: "kernel-devel-4.4.121-92.101.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.121-92.101.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", }, product_reference: "kernel-macros-4.4.121-92.101.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.121-92.101.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", }, product_reference: "kernel-source-4.4.121-92.101.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", }, product_reference: "kernel-syms-4.4.121-92.101.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.101.1.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", }, product_reference: "kernel-default-4.4.121-92.101.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.101.1.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", }, product_reference: "kernel-default-base-4.4.121-92.101.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.101.1.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", }, product_reference: "kernel-default-devel-4.4.121-92.101.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.121-92.101.1.noarch as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", }, product_reference: "kernel-devel-4.4.121-92.101.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.121-92.101.1.noarch as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", }, product_reference: "kernel-macros-4.4.121-92.101.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.121-92.101.1.noarch as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", }, product_reference: "kernel-source-4.4.121-92.101.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.101.1.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", }, product_reference: "kernel-syms-4.4.121-92.101.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, ], }, vulnerabilities: [ { cve: "CVE-2018-16862", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16862", }, ], notes: [ { category: "general", text: "A security flaw was found in the Linux kernel in a way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16862", url: "https://www.suse.com/security/cve/CVE-2018-16862", }, { category: "external", summary: "SUSE Bug 1117186 for CVE-2018-16862", url: "https://bugzilla.suse.com/1117186", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-19T14:35:53Z", details: "moderate", }, ], title: "CVE-2018-16862", }, { cve: "CVE-2018-16884", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16884", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16884", url: "https://www.suse.com/security/cve/CVE-2018-16884", }, { category: "external", summary: "SUSE Bug 1119946 for CVE-2018-16884", url: "https://bugzilla.suse.com/1119946", }, { category: "external", summary: "SUSE Bug 1119947 for CVE-2018-16884", url: "https://bugzilla.suse.com/1119947", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-19T14:35:53Z", details: "important", }, ], title: "CVE-2018-16884", }, { cve: "CVE-2018-18281", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18281", }, ], notes: [ { category: "general", text: "Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. This is fixed in the following kernel versions: 4.9.135, 4.14.78, 4.18.16, 4.19.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18281", url: "https://www.suse.com/security/cve/CVE-2018-18281", }, { category: "external", summary: "SUSE Bug 1113769 for CVE-2018-18281", url: "https://bugzilla.suse.com/1113769", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-19T14:35:53Z", details: "moderate", }, ], title: "CVE-2018-18281", }, { cve: "CVE-2018-18386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18386", }, ], notes: [ { category: "general", text: "drivers/tty/n_tty.c in the Linux kernel before 4.14.11 allows local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18386", url: "https://www.suse.com/security/cve/CVE-2018-18386", }, { category: "external", summary: "SUSE Bug 1094825 for CVE-2018-18386", url: "https://bugzilla.suse.com/1094825", }, { category: "external", summary: "SUSE Bug 1112039 for CVE-2018-18386", url: "https://bugzilla.suse.com/1112039", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-19T14:35:53Z", details: "moderate", }, ], title: "CVE-2018-18386", }, { cve: "CVE-2018-18690", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18690", }, ], notes: [ { category: "general", text: "In the Linux kernel before 4.17, a local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandles ATTR_REPLACE operations with conversion of an attr from short to long form.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18690", url: "https://www.suse.com/security/cve/CVE-2018-18690", }, { category: "external", summary: "SUSE Bug 1105025 for CVE-2018-18690", url: "https://bugzilla.suse.com/1105025", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-19T14:35:53Z", details: "moderate", }, ], title: "CVE-2018-18690", }, { cve: "CVE-2018-18710", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18710", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18710", url: "https://www.suse.com/security/cve/CVE-2018-18710", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-18710", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-19T14:35:53Z", details: "moderate", }, ], title: "CVE-2018-18710", }, { cve: "CVE-2018-19824", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19824", }, ], notes: [ { category: "general", text: "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19824", url: "https://www.suse.com/security/cve/CVE-2018-19824", }, { category: "external", summary: "SUSE Bug 1118152 for CVE-2018-19824", url: "https://bugzilla.suse.com/1118152", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-19T14:35:53Z", details: "moderate", }, ], title: "CVE-2018-19824", }, { cve: "CVE-2018-19985", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19985", }, ], notes: [ { category: "general", text: "The function hso_get_config_data in drivers/net/usb/hso.c in the Linux kernel through 4.19.8 reads if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allows arbitrary read in the kernel address space.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19985", url: "https://www.suse.com/security/cve/CVE-2018-19985", }, { category: "external", summary: "SUSE Bug 1120743 for CVE-2018-19985", url: "https://bugzilla.suse.com/1120743", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-19T14:35:53Z", details: "low", }, ], title: "CVE-2018-19985", }, { cve: "CVE-2018-20169", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20169", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20169", url: "https://www.suse.com/security/cve/CVE-2018-20169", }, { category: "external", summary: "SUSE Bug 1119714 for CVE-2018-20169", url: "https://bugzilla.suse.com/1119714", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-19T14:35:53Z", details: "moderate", }, ], title: "CVE-2018-20169", }, { cve: "CVE-2018-9516", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-9516", }, ], notes: [ { category: "general", text: "In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-71361580.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-9516", url: "https://www.suse.com/security/cve/CVE-2018-9516", }, { category: "external", summary: "SUSE Bug 1108498 for CVE-2018-9516", url: "https://bugzilla.suse.com/1108498", }, { category: "external", summary: "SUSE Bug 1123161 for CVE-2018-9516", url: "https://bugzilla.suse.com/1123161", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-19T14:35:53Z", details: "moderate", }, ], title: "CVE-2018-9516", }, { cve: "CVE-2018-9568", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-9568", }, ], notes: [ { category: "general", text: "In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-9568", url: "https://www.suse.com/security/cve/CVE-2018-9568", }, { category: "external", summary: "SUSE Bug 1118319 for CVE-2018-9568", url: "https://bugzilla.suse.com/1118319", }, { category: "external", summary: "SUSE Bug 1118320 for CVE-2018-9568", url: "https://bugzilla.suse.com/1118320", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-19T14:35:53Z", details: "important", }, ], title: "CVE-2018-9568", }, { cve: "CVE-2019-3459", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3459", }, ], notes: [ { category: "general", text: "A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3459", url: "https://www.suse.com/security/cve/CVE-2019-3459", }, { category: "external", summary: "SUSE Bug 1120758 for CVE-2019-3459", url: "https://bugzilla.suse.com/1120758", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.6, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-19T14:35:53Z", details: "moderate", }, ], title: "CVE-2019-3459", }, { cve: "CVE-2019-3460", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3460", }, ], notes: [ { category: "general", text: "A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3460", url: "https://www.suse.com/security/cve/CVE-2019-3460", }, { category: "external", summary: "SUSE Bug 1120758 for CVE-2019-3460", url: "https://bugzilla.suse.com/1120758", }, { category: "external", summary: "SUSE Bug 1155131 for CVE-2019-3460", url: "https://bugzilla.suse.com/1155131", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.6, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-02-19T14:35:53Z", details: "moderate", }, ], title: "CVE-2019-3460", }, ], }
suse-su-2018:3746-1
Vulnerability from csaf_suse
Published
2018-11-13 07:16
Modified
2018-11-13 07:16
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 kernel was updated to 3.0.101-108.81 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-18281: An issue was discovered in the Linux kernel, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused (bnc#1113769).
- CVE-2018-18710: An issue was discovered in the Linux kernel, an information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).
- CVE-2018-18386: drivers/tty/n_tty.c in the Linux kernel allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).
- CVE-2017-7273: The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 4.x allowed physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report (bnc#1031240).
- CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674).
- CVE-2017-1000407: An denial of service issue was discovered in the Linux kernel, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic (bnc#1071021).
- CVE-2018-9516: An issue was discovered in the Linux kernel, the copy_to_user() inside the HID code does not correctly check the length before executing (bsc#1108498).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely (bnc#1107829).
The following non-security bugs were fixed:
- Btrfs: fix deadlock when finalizing block group creation (bsc#1107849).
- Btrfs: fix quick exhaustion of the system array in the superblock (bsc#1107849).
- FS-Cache: Synchronise object death state change vs operation submission (bsc#1107371).
- KABI: move the new handler to end of machdep_calls and hide it from genksyms (bsc#1094244).
- KVM: Disable irq while unregistering user notifier (bsc#1106240).
- KVM: SVM: obey guest PAT (bsc#1106240).
- KVM: VMX: remove I/O port 0x80 bypass on Intel hosts (bsc#1106240).
- KVM: emulate: fix CMPXCHG8B on 32-bit hosts (bsc#1106240).
- KVM: x86: emulator: Return to user-mode on L1 CPL=0 emulation failure (bsc#1106240).
- KVM: x86: fix use of uninitialized memory as segment descriptor in emulator (bsc#1106240).
- KVM: x86: zero base3 of unusable segments (bsc#1106240).
- NFS - do not hang if xdr decoded username is bad (bsc#1105799).
- NFSv4.1 - Do not leak IO size from one mount to another (bsc#1103145).
- PCI/AER: Report non-fatal errors only to the affected endpoint (bsc#1109806).
- PCI: Supply CPU physical address (not bus address) to iomem_is_exclusive() (bsc#1109806).
- PCI: shpchp: Check bridge's secondary (not primary) bus speed (bsc#1109806).
- PCI: shpchp: Fix AMD POGO identification (bsc#1109806).
- add kernel parameter to disable failfast on block devices (bsc#1081680).
- block: add flag QUEUE_FLAG_REGISTERED (bsc#1047027).
- block: allow gendisk's request_queue registration to be deferred (bsc#1047027).
- crypto: ghash-clmulni-intel - use C implementation for setkey() (bsc#1110006).
- dm: fix incomplete request_queue initialization (bsc#1047027).
- dm: only initialize the request_queue once (bsc#1047027).
- firmware/ihex2fw.c: restore missing default in switch statement (bsc#1114460).
- kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE (git-fixes).
- locks: fix unlock when fcntl_setlk races with a close (git-fixes).
- media: Fix invalid free in the fix for mceusb (bsc#1050431).
- media: cx25821: prevent out-of-bounds read on array card (bsc#1050431).
- media: ite-cir: initialize use_demodulator before using it (bsc#1050431).
- media: mceusb: fix NULL-deref at probe (bsc#1050431).
- media: mceusb: fix memory leaks in error path.
- percpu: make pcpu_alloc_chunk() use pcpu_mem_free() instead of kfree() (git fixes).
- powerpc, KVM: Rework KVM checks in first-level interrupt handlers (bsc#1094244).
- powerpc/64: Do load of PACAKBASE in LOAD_HANDLER (bsc#1094244).
- powerpc/64: Fix smp_wmb barrier definition use use lwsync consistently (bsc#1064861).
- powerpc/64: Initialise thread_info for emergency stacks (bsc#1094244).
- powerpc/64s: Exception macro for stack frame and initial register save (bsc#1094244).
- powerpc/64s: move machine check SLB flushing to mm/slb.c (bsc#1094244).
- powerpc/asm: Mark cr0 as clobbered in mftb() (bsc#1049128).
- powerpc/book3s: Introduce a early machine check hook in cpu_spec (bsc#1094244).
- powerpc/book3s: Introduce exclusive emergency stack for machine check exception (bsc#1094244).
- powerpc/book3s: Split the common exception prolog logic into two section (bsc#1094244).
- powerpc/book3s: handle machine check in Linux host (bsc#1094244).
- powerpc/mce: Fix SLB rebolting during MCE recovery path (bsc#1094244).
- powerpc/pseries: Avoid using the size greater than (bsc#1094244).
- powerpc/pseries: Defer the logging of rtas error to irq work queue (bsc#1094244).
- powerpc/pseries: Dump the SLB contents on SLB MCE errors (bsc#1094244).
- powerpc/pseries: Flush SLB contents on SLB MCE errors (bsc#1094244).
- powerpc: Add a symbol for hypervisor trampolines (bsc#1094244).
- powerpc: Fix smp_mb__before_spinlock() (bsc#1110247).
- powerpc: Make load_hander handle upto 64k offset (bsc#1094244).
- powerpc: Rework runlatch code (bsc#1094244).
- powerpc: Save CFAR before branching in interrupt entry paths (bsc#1094244).
- powerpc: cputable: KABI - hide new cpu_spec member from genksyms (bsc#1094244).
- powerpc: move MCE handler out-of-line and consolidate with machine_check_fwnmi (bsc#1094244).
- powerpc: move stab code into #ifndef CONFIG_POWER4_ONLY (bsc#1094244).
- powerpc: replace open-coded EXCEPTION_PROLOG_1 with the macro in slb miss handlers (bsc#1094244).
- reiserfs: add check to detect corrupted directory entry (bsc#1109818).
- reiserfs: do not panic on bad directory entries (bsc#1109818).
- retpoline: Introduce start/end markers of indirect thunk (bsc#1113337).
- s390/facilites: use stfle_fac_list array size for MAX_FACILITY_BIT (bnc#1108314, LTC#171326).
- s390/sclp: Change SCLP console default buffer-full behavior (bnc#1108314, LTC#171049).
- scsi: libfc: Do not drop down to FLOGI for fc_rport_login() (bsc#1106139).
- scsi: libfc: Do not login if the port is already started (bsc#1106139).
- scsi: libfc: do not advance state machine for incoming FLOGI (bsc#1106139).
- scsi: storvsc: fix memory leak on ring buffer busy (bnc#923775).
- signals: avoid unnecessary taking of sighand->siglock (bsc#1110247).
- x86/kexec: Avoid double free_page() upon do_kexec_load() failure (bsc#1110006).
- x86/mm/32: Set the '__vmalloc_start_set' flag in initmem_init() (bsc#1110006).
- x86/paravirt: Fix some warning messages (bnc#1065600).
- x86/percpu: Fix this_cpu_read() (bsc#1110006).
- x86/process: Re-export start_thread() (bsc#1110006).
- x86/vdso: Fix asm constraints on vDSO syscall fallbacks (bsc#1110006).
Patchnames
sdksp4-kernel-source-13863,slessp4-kernel-source-13863,slexsp3-kernel-source-13863
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to 3.0.101-108.81 to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-18281: An issue was discovered in the Linux kernel, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused (bnc#1113769).\n- CVE-2018-18710: An issue was discovered in the Linux kernel, an information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).\n- CVE-2018-18386: drivers/tty/n_tty.c in the Linux kernel allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).\n- CVE-2017-7273: The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 4.x allowed physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report (bnc#1031240).\n- CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674).\n- CVE-2017-1000407: An denial of service issue was discovered in the Linux kernel, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic (bnc#1071021).\n- CVE-2018-9516: An issue was discovered in the Linux kernel, the copy_to_user() inside the HID code does not correctly check the length before executing (bsc#1108498).\n- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely (bnc#1107829).\n\nThe following non-security bugs were fixed:\n\n- Btrfs: fix deadlock when finalizing block group creation (bsc#1107849).\n- Btrfs: fix quick exhaustion of the system array in the superblock (bsc#1107849).\n- FS-Cache: Synchronise object death state change vs operation submission (bsc#1107371).\n- KABI: move the new handler to end of machdep_calls and hide it from genksyms (bsc#1094244).\n- KVM: Disable irq while unregistering user notifier (bsc#1106240).\n- KVM: SVM: obey guest PAT (bsc#1106240).\n- KVM: VMX: remove I/O port 0x80 bypass on Intel hosts (bsc#1106240).\n- KVM: emulate: fix CMPXCHG8B on 32-bit hosts (bsc#1106240).\n- KVM: x86: emulator: Return to user-mode on L1 CPL=0 emulation failure (bsc#1106240).\n- KVM: x86: fix use of uninitialized memory as segment descriptor in emulator (bsc#1106240).\n- KVM: x86: zero base3 of unusable segments (bsc#1106240).\n- NFS - do not hang if xdr decoded username is bad (bsc#1105799).\n- NFSv4.1 - Do not leak IO size from one mount to another (bsc#1103145).\n- PCI/AER: Report non-fatal errors only to the affected endpoint (bsc#1109806).\n- PCI: Supply CPU physical address (not bus address) to iomem_is_exclusive() (bsc#1109806).\n- PCI: shpchp: Check bridge's secondary (not primary) bus speed (bsc#1109806).\n- PCI: shpchp: Fix AMD POGO identification (bsc#1109806).\n- add kernel parameter to disable failfast on block devices (bsc#1081680).\n- block: add flag QUEUE_FLAG_REGISTERED (bsc#1047027).\n- block: allow gendisk's request_queue registration to be deferred (bsc#1047027).\n- crypto: ghash-clmulni-intel - use C implementation for setkey() (bsc#1110006).\n- dm: fix incomplete request_queue initialization (bsc#1047027).\n- dm: only initialize the request_queue once (bsc#1047027).\n- firmware/ihex2fw.c: restore missing default in switch statement (bsc#1114460).\n- kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE (git-fixes).\n- locks: fix unlock when fcntl_setlk races with a close (git-fixes).\n- media: Fix invalid free in the fix for mceusb (bsc#1050431).\n- media: cx25821: prevent out-of-bounds read on array card (bsc#1050431).\n- media: ite-cir: initialize use_demodulator before using it (bsc#1050431).\n- media: mceusb: fix NULL-deref at probe (bsc#1050431).\n- media: mceusb: fix memory leaks in error path.\n- percpu: make pcpu_alloc_chunk() use pcpu_mem_free() instead of kfree() (git fixes).\n- powerpc, KVM: Rework KVM checks in first-level interrupt handlers (bsc#1094244).\n- powerpc/64: Do load of PACAKBASE in LOAD_HANDLER (bsc#1094244).\n- powerpc/64: Fix smp_wmb barrier definition use use lwsync consistently (bsc#1064861).\n- powerpc/64: Initialise thread_info for emergency stacks (bsc#1094244).\n- powerpc/64s: Exception macro for stack frame and initial register save (bsc#1094244).\n- powerpc/64s: move machine check SLB flushing to mm/slb.c (bsc#1094244).\n- powerpc/asm: Mark cr0 as clobbered in mftb() (bsc#1049128).\n- powerpc/book3s: Introduce a early machine check hook in cpu_spec (bsc#1094244).\n- powerpc/book3s: Introduce exclusive emergency stack for machine check exception (bsc#1094244).\n- powerpc/book3s: Split the common exception prolog logic into two section (bsc#1094244).\n- powerpc/book3s: handle machine check in Linux host (bsc#1094244).\n- powerpc/mce: Fix SLB rebolting during MCE recovery path (bsc#1094244).\n- powerpc/pseries: Avoid using the size greater than (bsc#1094244).\n- powerpc/pseries: Defer the logging of rtas error to irq work queue (bsc#1094244).\n- powerpc/pseries: Dump the SLB contents on SLB MCE errors (bsc#1094244).\n- powerpc/pseries: Flush SLB contents on SLB MCE errors (bsc#1094244).\n- powerpc: Add a symbol for hypervisor trampolines (bsc#1094244).\n- powerpc: Fix smp_mb__before_spinlock() (bsc#1110247).\n- powerpc: Make load_hander handle upto 64k offset (bsc#1094244).\n- powerpc: Rework runlatch code (bsc#1094244).\n- powerpc: Save CFAR before branching in interrupt entry paths (bsc#1094244).\n- powerpc: cputable: KABI - hide new cpu_spec member from genksyms (bsc#1094244).\n- powerpc: move MCE handler out-of-line and consolidate with machine_check_fwnmi (bsc#1094244).\n- powerpc: move stab code into #ifndef CONFIG_POWER4_ONLY (bsc#1094244).\n- powerpc: replace open-coded EXCEPTION_PROLOG_1 with the macro in slb miss handlers (bsc#1094244).\n- reiserfs: add check to detect corrupted directory entry (bsc#1109818).\n- reiserfs: do not panic on bad directory entries (bsc#1109818).\n- retpoline: Introduce start/end markers of indirect thunk (bsc#1113337).\n- s390/facilites: use stfle_fac_list array size for MAX_FACILITY_BIT (bnc#1108314, LTC#171326).\n- s390/sclp: Change SCLP console default buffer-full behavior (bnc#1108314, LTC#171049).\n- scsi: libfc: Do not drop down to FLOGI for fc_rport_login() (bsc#1106139).\n- scsi: libfc: Do not login if the port is already started (bsc#1106139).\n- scsi: libfc: do not advance state machine for incoming FLOGI (bsc#1106139).\n- scsi: storvsc: fix memory leak on ring buffer busy (bnc#923775).\n- signals: avoid unnecessary taking of sighand->siglock (bsc#1110247).\n- x86/kexec: Avoid double free_page() upon do_kexec_load() failure (bsc#1110006).\n- x86/mm/32: Set the '__vmalloc_start_set' flag in initmem_init() (bsc#1110006).\n- x86/paravirt: Fix some warning messages (bnc#1065600).\n- x86/percpu: Fix this_cpu_read() (bsc#1110006).\n- x86/process: Re-export start_thread() (bsc#1110006).\n- x86/vdso: Fix asm constraints on vDSO syscall fallbacks (bsc#1110006).\n", title: "Description of the patch", }, { category: "details", text: "sdksp4-kernel-source-13863,slessp4-kernel-source-13863,slexsp3-kernel-source-13863", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3746-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:3746-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183746-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:3746-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-November/004845.html", }, { category: "self", summary: "SUSE Bug 1031240", url: "https://bugzilla.suse.com/1031240", }, { category: "self", summary: "SUSE Bug 1047027", url: "https://bugzilla.suse.com/1047027", }, { category: "self", summary: "SUSE Bug 1049128", url: "https://bugzilla.suse.com/1049128", }, { category: "self", summary: "SUSE Bug 1050431", url: "https://bugzilla.suse.com/1050431", }, { category: "self", summary: "SUSE Bug 1064861", url: "https://bugzilla.suse.com/1064861", }, { category: "self", summary: "SUSE Bug 1065600", url: "https://bugzilla.suse.com/1065600", }, { category: "self", summary: "SUSE Bug 1066674", url: "https://bugzilla.suse.com/1066674", }, { category: "self", summary: "SUSE Bug 1071021", url: "https://bugzilla.suse.com/1071021", }, { category: "self", summary: "SUSE Bug 1081680", url: "https://bugzilla.suse.com/1081680", }, { category: "self", summary: "SUSE Bug 1094244", url: "https://bugzilla.suse.com/1094244", }, { category: "self", summary: "SUSE Bug 1094825", url: "https://bugzilla.suse.com/1094825", }, { category: "self", summary: "SUSE Bug 1103145", url: "https://bugzilla.suse.com/1103145", }, { category: "self", summary: "SUSE Bug 1105799", url: "https://bugzilla.suse.com/1105799", }, { category: "self", summary: "SUSE Bug 1106139", url: "https://bugzilla.suse.com/1106139", }, { category: "self", summary: "SUSE Bug 1106240", url: "https://bugzilla.suse.com/1106240", }, { category: "self", summary: "SUSE Bug 1107371", url: "https://bugzilla.suse.com/1107371", }, { category: "self", summary: "SUSE Bug 1107829", url: "https://bugzilla.suse.com/1107829", }, { category: "self", summary: "SUSE Bug 1107849", url: "https://bugzilla.suse.com/1107849", }, { category: "self", summary: "SUSE Bug 1108314", url: "https://bugzilla.suse.com/1108314", }, { category: "self", summary: "SUSE Bug 1108498", url: "https://bugzilla.suse.com/1108498", }, { category: "self", summary: "SUSE Bug 1109806", url: "https://bugzilla.suse.com/1109806", }, { category: "self", summary: "SUSE Bug 1109818", url: "https://bugzilla.suse.com/1109818", }, { category: "self", summary: "SUSE Bug 1110006", url: "https://bugzilla.suse.com/1110006", }, { category: "self", summary: "SUSE Bug 1110247", url: "https://bugzilla.suse.com/1110247", }, { category: "self", summary: "SUSE Bug 1113337", url: "https://bugzilla.suse.com/1113337", }, { category: "self", summary: "SUSE Bug 1113751", url: "https://bugzilla.suse.com/1113751", }, { category: "self", summary: "SUSE Bug 1113769", url: "https://bugzilla.suse.com/1113769", }, { category: "self", summary: "SUSE Bug 1114460", url: "https://bugzilla.suse.com/1114460", }, { category: "self", summary: "SUSE Bug 923775", url: "https://bugzilla.suse.com/923775", }, { category: "self", summary: "SUSE CVE CVE-2017-1000407 page", url: "https://www.suse.com/security/cve/CVE-2017-1000407/", }, { category: "self", summary: "SUSE CVE CVE-2017-16533 page", url: "https://www.suse.com/security/cve/CVE-2017-16533/", }, { category: "self", summary: "SUSE CVE CVE-2017-7273 page", url: "https://www.suse.com/security/cve/CVE-2017-7273/", }, { category: "self", summary: "SUSE CVE CVE-2018-14633 page", url: "https://www.suse.com/security/cve/CVE-2018-14633/", }, { category: "self", summary: "SUSE CVE CVE-2018-18281 page", url: "https://www.suse.com/security/cve/CVE-2018-18281/", }, { category: "self", summary: "SUSE CVE CVE-2018-18386 page", url: "https://www.suse.com/security/cve/CVE-2018-18386/", }, { category: "self", summary: "SUSE CVE CVE-2018-18710 page", url: "https://www.suse.com/security/cve/CVE-2018-18710/", }, { category: "self", summary: "SUSE CVE CVE-2018-9516 page", url: "https://www.suse.com/security/cve/CVE-2018-9516/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2018-11-13T07:16:15Z", generator: { date: "2018-11-13T07:16:15Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:3746-1", initial_release_date: "2018-11-13T07:16:15Z", revision_history: [ { date: "2018-11-13T07:16:15Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-default-3.0.101-108.81.1.i586", product: { name: "kernel-default-3.0.101-108.81.1.i586", product_id: "kernel-default-3.0.101-108.81.1.i586", }, }, { category: "product_version", name: "kernel-default-base-3.0.101-108.81.1.i586", product: { name: "kernel-default-base-3.0.101-108.81.1.i586", product_id: "kernel-default-base-3.0.101-108.81.1.i586", }, }, { category: "product_version", name: "kernel-default-devel-3.0.101-108.81.1.i586", product: { name: "kernel-default-devel-3.0.101-108.81.1.i586", product_id: "kernel-default-devel-3.0.101-108.81.1.i586", }, }, { category: "product_version", name: "kernel-ec2-3.0.101-108.81.1.i586", product: { name: "kernel-ec2-3.0.101-108.81.1.i586", product_id: "kernel-ec2-3.0.101-108.81.1.i586", }, }, { category: "product_version", name: "kernel-ec2-base-3.0.101-108.81.1.i586", product: { name: "kernel-ec2-base-3.0.101-108.81.1.i586", product_id: "kernel-ec2-base-3.0.101-108.81.1.i586", }, }, { category: "product_version", name: "kernel-ec2-devel-3.0.101-108.81.1.i586", product: { name: "kernel-ec2-devel-3.0.101-108.81.1.i586", product_id: "kernel-ec2-devel-3.0.101-108.81.1.i586", }, }, { category: "product_version", name: "kernel-pae-3.0.101-108.81.1.i586", product: { name: "kernel-pae-3.0.101-108.81.1.i586", product_id: "kernel-pae-3.0.101-108.81.1.i586", }, }, { category: "product_version", name: "kernel-pae-base-3.0.101-108.81.1.i586", product: { name: "kernel-pae-base-3.0.101-108.81.1.i586", product_id: "kernel-pae-base-3.0.101-108.81.1.i586", }, }, { category: "product_version", name: "kernel-pae-devel-3.0.101-108.81.1.i586", product: { name: "kernel-pae-devel-3.0.101-108.81.1.i586", product_id: "kernel-pae-devel-3.0.101-108.81.1.i586", }, }, { category: "product_version", name: "kernel-source-3.0.101-108.81.1.i586", product: { name: "kernel-source-3.0.101-108.81.1.i586", product_id: "kernel-source-3.0.101-108.81.1.i586", }, }, { category: "product_version", name: "kernel-syms-3.0.101-108.81.1.i586", product: { name: "kernel-syms-3.0.101-108.81.1.i586", product_id: "kernel-syms-3.0.101-108.81.1.i586", }, }, { category: "product_version", name: "kernel-trace-3.0.101-108.81.1.i586", product: { name: "kernel-trace-3.0.101-108.81.1.i586", product_id: "kernel-trace-3.0.101-108.81.1.i586", }, }, { category: "product_version", name: "kernel-trace-base-3.0.101-108.81.1.i586", product: { name: "kernel-trace-base-3.0.101-108.81.1.i586", product_id: "kernel-trace-base-3.0.101-108.81.1.i586", }, }, { category: "product_version", name: "kernel-trace-devel-3.0.101-108.81.1.i586", product: { name: "kernel-trace-devel-3.0.101-108.81.1.i586", product_id: "kernel-trace-devel-3.0.101-108.81.1.i586", }, }, { category: "product_version", name: "kernel-xen-3.0.101-108.81.1.i586", product: { name: "kernel-xen-3.0.101-108.81.1.i586", product_id: "kernel-xen-3.0.101-108.81.1.i586", }, }, { category: "product_version", name: "kernel-xen-base-3.0.101-108.81.1.i586", product: { name: "kernel-xen-base-3.0.101-108.81.1.i586", product_id: "kernel-xen-base-3.0.101-108.81.1.i586", }, }, { category: "product_version", name: "kernel-xen-devel-3.0.101-108.81.1.i586", product: { name: "kernel-xen-devel-3.0.101-108.81.1.i586", product_id: "kernel-xen-devel-3.0.101-108.81.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "kernel-default-3.0.101-108.81.1.ia64", product: { name: "kernel-default-3.0.101-108.81.1.ia64", product_id: "kernel-default-3.0.101-108.81.1.ia64", }, }, { category: "product_version", name: "kernel-default-base-3.0.101-108.81.1.ia64", product: { name: "kernel-default-base-3.0.101-108.81.1.ia64", product_id: "kernel-default-base-3.0.101-108.81.1.ia64", }, }, { category: "product_version", name: "kernel-default-devel-3.0.101-108.81.1.ia64", product: { name: "kernel-default-devel-3.0.101-108.81.1.ia64", product_id: "kernel-default-devel-3.0.101-108.81.1.ia64", }, }, { category: "product_version", name: "kernel-source-3.0.101-108.81.1.ia64", product: { name: "kernel-source-3.0.101-108.81.1.ia64", product_id: "kernel-source-3.0.101-108.81.1.ia64", }, }, { category: "product_version", name: "kernel-syms-3.0.101-108.81.1.ia64", product: { name: "kernel-syms-3.0.101-108.81.1.ia64", product_id: "kernel-syms-3.0.101-108.81.1.ia64", }, }, { category: "product_version", name: "kernel-trace-3.0.101-108.81.1.ia64", product: { name: "kernel-trace-3.0.101-108.81.1.ia64", product_id: "kernel-trace-3.0.101-108.81.1.ia64", }, }, { category: "product_version", name: "kernel-trace-base-3.0.101-108.81.1.ia64", product: { name: "kernel-trace-base-3.0.101-108.81.1.ia64", product_id: "kernel-trace-base-3.0.101-108.81.1.ia64", }, }, { category: "product_version", name: "kernel-trace-devel-3.0.101-108.81.1.ia64", product: { name: "kernel-trace-devel-3.0.101-108.81.1.ia64", product_id: "kernel-trace-devel-3.0.101-108.81.1.ia64", }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "kernel-docs-3.0.101-108.81.1.noarch", product: { name: "kernel-docs-3.0.101-108.81.1.noarch", product_id: "kernel-docs-3.0.101-108.81.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-bigmem-3.0.101-108.81.1.ppc64", product: { name: "kernel-bigmem-3.0.101-108.81.1.ppc64", product_id: "kernel-bigmem-3.0.101-108.81.1.ppc64", }, }, { category: "product_version", name: "kernel-bigmem-base-3.0.101-108.81.1.ppc64", product: { name: "kernel-bigmem-base-3.0.101-108.81.1.ppc64", product_id: "kernel-bigmem-base-3.0.101-108.81.1.ppc64", }, }, { category: "product_version", name: "kernel-bigmem-devel-3.0.101-108.81.1.ppc64", product: { name: "kernel-bigmem-devel-3.0.101-108.81.1.ppc64", product_id: "kernel-bigmem-devel-3.0.101-108.81.1.ppc64", }, }, { category: "product_version", name: "kernel-default-3.0.101-108.81.1.ppc64", product: { name: "kernel-default-3.0.101-108.81.1.ppc64", product_id: "kernel-default-3.0.101-108.81.1.ppc64", }, }, { category: "product_version", name: "kernel-default-base-3.0.101-108.81.1.ppc64", product: { name: "kernel-default-base-3.0.101-108.81.1.ppc64", product_id: "kernel-default-base-3.0.101-108.81.1.ppc64", }, }, { category: "product_version", name: "kernel-default-devel-3.0.101-108.81.1.ppc64", product: { name: "kernel-default-devel-3.0.101-108.81.1.ppc64", product_id: "kernel-default-devel-3.0.101-108.81.1.ppc64", }, }, { category: "product_version", name: "kernel-ppc64-3.0.101-108.81.1.ppc64", product: { name: "kernel-ppc64-3.0.101-108.81.1.ppc64", product_id: "kernel-ppc64-3.0.101-108.81.1.ppc64", }, }, { category: "product_version", name: "kernel-ppc64-base-3.0.101-108.81.1.ppc64", product: { name: "kernel-ppc64-base-3.0.101-108.81.1.ppc64", product_id: "kernel-ppc64-base-3.0.101-108.81.1.ppc64", }, }, { category: "product_version", name: "kernel-ppc64-devel-3.0.101-108.81.1.ppc64", product: { name: "kernel-ppc64-devel-3.0.101-108.81.1.ppc64", product_id: "kernel-ppc64-devel-3.0.101-108.81.1.ppc64", }, }, { category: "product_version", name: "kernel-source-3.0.101-108.81.1.ppc64", product: { name: "kernel-source-3.0.101-108.81.1.ppc64", product_id: "kernel-source-3.0.101-108.81.1.ppc64", }, }, { category: "product_version", name: "kernel-syms-3.0.101-108.81.1.ppc64", product: { name: "kernel-syms-3.0.101-108.81.1.ppc64", product_id: "kernel-syms-3.0.101-108.81.1.ppc64", }, }, { category: "product_version", name: "kernel-trace-3.0.101-108.81.1.ppc64", product: { name: "kernel-trace-3.0.101-108.81.1.ppc64", product_id: "kernel-trace-3.0.101-108.81.1.ppc64", }, }, { category: "product_version", name: "kernel-trace-base-3.0.101-108.81.1.ppc64", product: { name: "kernel-trace-base-3.0.101-108.81.1.ppc64", product_id: "kernel-trace-base-3.0.101-108.81.1.ppc64", }, }, { category: "product_version", name: "kernel-trace-devel-3.0.101-108.81.1.ppc64", product: { name: "kernel-trace-devel-3.0.101-108.81.1.ppc64", product_id: "kernel-trace-devel-3.0.101-108.81.1.ppc64", }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "kernel-default-3.0.101-108.81.1.s390x", product: { name: "kernel-default-3.0.101-108.81.1.s390x", product_id: "kernel-default-3.0.101-108.81.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-3.0.101-108.81.1.s390x", product: { name: "kernel-default-base-3.0.101-108.81.1.s390x", product_id: "kernel-default-base-3.0.101-108.81.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-3.0.101-108.81.1.s390x", product: { name: "kernel-default-devel-3.0.101-108.81.1.s390x", product_id: "kernel-default-devel-3.0.101-108.81.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-3.0.101-108.81.1.s390x", product: { name: "kernel-default-man-3.0.101-108.81.1.s390x", product_id: "kernel-default-man-3.0.101-108.81.1.s390x", }, }, { category: "product_version", name: "kernel-source-3.0.101-108.81.1.s390x", product: { name: "kernel-source-3.0.101-108.81.1.s390x", product_id: "kernel-source-3.0.101-108.81.1.s390x", }, }, { category: "product_version", name: "kernel-syms-3.0.101-108.81.1.s390x", product: { name: "kernel-syms-3.0.101-108.81.1.s390x", product_id: "kernel-syms-3.0.101-108.81.1.s390x", }, }, { category: "product_version", name: "kernel-trace-3.0.101-108.81.1.s390x", product: { name: "kernel-trace-3.0.101-108.81.1.s390x", product_id: "kernel-trace-3.0.101-108.81.1.s390x", }, }, { category: "product_version", name: "kernel-trace-base-3.0.101-108.81.1.s390x", product: { name: "kernel-trace-base-3.0.101-108.81.1.s390x", product_id: "kernel-trace-base-3.0.101-108.81.1.s390x", }, }, { category: "product_version", name: "kernel-trace-devel-3.0.101-108.81.1.s390x", product: { name: "kernel-trace-devel-3.0.101-108.81.1.s390x", product_id: "kernel-trace-devel-3.0.101-108.81.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "kernel-default-3.0.101-108.81.1.x86_64", product: { name: "kernel-default-3.0.101-108.81.1.x86_64", product_id: "kernel-default-3.0.101-108.81.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-3.0.101-108.81.1.x86_64", product: { name: "kernel-default-base-3.0.101-108.81.1.x86_64", product_id: "kernel-default-base-3.0.101-108.81.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-3.0.101-108.81.1.x86_64", product: { name: "kernel-default-devel-3.0.101-108.81.1.x86_64", product_id: "kernel-default-devel-3.0.101-108.81.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-3.0.101-108.81.1.x86_64", product: { name: "kernel-ec2-3.0.101-108.81.1.x86_64", product_id: "kernel-ec2-3.0.101-108.81.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-base-3.0.101-108.81.1.x86_64", product: { name: "kernel-ec2-base-3.0.101-108.81.1.x86_64", product_id: "kernel-ec2-base-3.0.101-108.81.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-devel-3.0.101-108.81.1.x86_64", product: { name: "kernel-ec2-devel-3.0.101-108.81.1.x86_64", product_id: "kernel-ec2-devel-3.0.101-108.81.1.x86_64", }, }, { category: "product_version", name: "kernel-source-3.0.101-108.81.1.x86_64", product: { name: "kernel-source-3.0.101-108.81.1.x86_64", product_id: "kernel-source-3.0.101-108.81.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-3.0.101-108.81.1.x86_64", product: { name: "kernel-syms-3.0.101-108.81.1.x86_64", product_id: "kernel-syms-3.0.101-108.81.1.x86_64", }, }, { category: "product_version", name: "kernel-trace-3.0.101-108.81.1.x86_64", product: { name: "kernel-trace-3.0.101-108.81.1.x86_64", product_id: "kernel-trace-3.0.101-108.81.1.x86_64", }, }, { category: "product_version", name: "kernel-trace-base-3.0.101-108.81.1.x86_64", product: { name: "kernel-trace-base-3.0.101-108.81.1.x86_64", product_id: "kernel-trace-base-3.0.101-108.81.1.x86_64", }, }, { category: "product_version", name: "kernel-trace-devel-3.0.101-108.81.1.x86_64", product: { name: "kernel-trace-devel-3.0.101-108.81.1.x86_64", product_id: "kernel-trace-devel-3.0.101-108.81.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-3.0.101-108.81.1.x86_64", product: { name: "kernel-xen-3.0.101-108.81.1.x86_64", product_id: "kernel-xen-3.0.101-108.81.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-base-3.0.101-108.81.1.x86_64", product: { name: "kernel-xen-base-3.0.101-108.81.1.x86_64", product_id: "kernel-xen-base-3.0.101-108.81.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-devel-3.0.101-108.81.1.x86_64", product: { name: "kernel-xen-devel-3.0.101-108.81.1.x86_64", product_id: "kernel-xen-devel-3.0.101-108.81.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 11 SP4", product: { name: "SUSE Linux Enterprise Software Development Kit 11 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 11 SP4", product_identification_helper: { cpe: "cpe:/a:suse:sle-sdk:11:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 11 SP4", product: { name: "SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4", product_identification_helper: { cpe: "cpe:/o:suse:suse_sles:11:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:11:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-docs-3.0.101-108.81.1.noarch as component of SUSE Linux Enterprise Software Development Kit 11 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.81.1.noarch", }, product_reference: "kernel-docs-3.0.101-108.81.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-bigmem-3.0.101-108.81.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", }, product_reference: "kernel-bigmem-3.0.101-108.81.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-bigmem-base-3.0.101-108.81.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", }, product_reference: "kernel-bigmem-base-3.0.101-108.81.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-bigmem-devel-3.0.101-108.81.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", }, product_reference: "kernel-bigmem-devel-3.0.101-108.81.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.i586", }, product_reference: "kernel-default-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-108.81.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ia64", }, product_reference: "kernel-default-3.0.101-108.81.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-108.81.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", }, product_reference: "kernel-default-3.0.101-108.81.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-108.81.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.s390x", }, product_reference: "kernel-default-3.0.101-108.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-108.81.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", }, product_reference: "kernel-default-3.0.101-108.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", }, product_reference: "kernel-default-base-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-108.81.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", }, product_reference: "kernel-default-base-3.0.101-108.81.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-108.81.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", }, product_reference: "kernel-default-base-3.0.101-108.81.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-108.81.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", }, product_reference: "kernel-default-base-3.0.101-108.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-108.81.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", }, product_reference: "kernel-default-base-3.0.101-108.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", }, product_reference: "kernel-default-devel-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-108.81.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", }, product_reference: "kernel-default-devel-3.0.101-108.81.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-108.81.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", }, product_reference: "kernel-default-devel-3.0.101-108.81.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-108.81.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", }, product_reference: "kernel-default-devel-3.0.101-108.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-108.81.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", }, product_reference: "kernel-default-devel-3.0.101-108.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-3.0.101-108.81.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", }, product_reference: "kernel-default-man-3.0.101-108.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", }, product_reference: "kernel-ec2-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-3.0.101-108.81.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", }, product_reference: "kernel-ec2-3.0.101-108.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-base-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", }, product_reference: "kernel-ec2-base-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-base-3.0.101-108.81.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", }, product_reference: "kernel-ec2-base-3.0.101-108.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-devel-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", }, product_reference: "kernel-ec2-devel-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-devel-3.0.101-108.81.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", }, product_reference: "kernel-ec2-devel-3.0.101-108.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-pae-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.81.1.i586", }, product_reference: "kernel-pae-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-pae-base-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", }, product_reference: "kernel-pae-base-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-pae-devel-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", }, product_reference: "kernel-pae-devel-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ppc64-3.0.101-108.81.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", }, product_reference: "kernel-ppc64-3.0.101-108.81.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ppc64-base-3.0.101-108.81.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", }, product_reference: "kernel-ppc64-base-3.0.101-108.81.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ppc64-devel-3.0.101-108.81.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", }, product_reference: "kernel-ppc64-devel-3.0.101-108.81.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.i586", }, product_reference: "kernel-source-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-108.81.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ia64", }, product_reference: "kernel-source-3.0.101-108.81.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-108.81.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", }, product_reference: "kernel-source-3.0.101-108.81.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-108.81.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.s390x", }, product_reference: "kernel-source-3.0.101-108.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-108.81.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", }, product_reference: "kernel-source-3.0.101-108.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.i586", }, product_reference: "kernel-syms-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-108.81.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", }, product_reference: "kernel-syms-3.0.101-108.81.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-108.81.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", }, product_reference: "kernel-syms-3.0.101-108.81.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-108.81.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", }, product_reference: "kernel-syms-3.0.101-108.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-108.81.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", }, product_reference: "kernel-syms-3.0.101-108.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.i586", }, product_reference: "kernel-trace-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-108.81.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", }, product_reference: "kernel-trace-3.0.101-108.81.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-108.81.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", }, product_reference: "kernel-trace-3.0.101-108.81.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-108.81.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", }, product_reference: "kernel-trace-3.0.101-108.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-108.81.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", }, product_reference: "kernel-trace-3.0.101-108.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", }, product_reference: "kernel-trace-base-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-108.81.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", }, product_reference: "kernel-trace-base-3.0.101-108.81.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-108.81.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", }, product_reference: "kernel-trace-base-3.0.101-108.81.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-108.81.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", }, product_reference: "kernel-trace-base-3.0.101-108.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-108.81.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", }, product_reference: "kernel-trace-base-3.0.101-108.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", }, product_reference: "kernel-trace-devel-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-108.81.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", }, product_reference: "kernel-trace-devel-3.0.101-108.81.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-108.81.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", }, product_reference: "kernel-trace-devel-3.0.101-108.81.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-108.81.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", }, product_reference: "kernel-trace-devel-3.0.101-108.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-108.81.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", }, product_reference: "kernel-trace-devel-3.0.101-108.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.i586", }, product_reference: "kernel-xen-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.0.101-108.81.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", }, product_reference: "kernel-xen-3.0.101-108.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", }, product_reference: "kernel-xen-base-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.0.101-108.81.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", }, product_reference: "kernel-xen-base-3.0.101-108.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", }, product_reference: "kernel-xen-devel-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.0.101-108.81.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", }, product_reference: "kernel-xen-devel-3.0.101-108.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-bigmem-3.0.101-108.81.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", }, product_reference: "kernel-bigmem-3.0.101-108.81.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-bigmem-base-3.0.101-108.81.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", }, product_reference: "kernel-bigmem-base-3.0.101-108.81.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-bigmem-devel-3.0.101-108.81.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", }, product_reference: "kernel-bigmem-devel-3.0.101-108.81.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.i586", }, product_reference: "kernel-default-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-108.81.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ia64", }, product_reference: "kernel-default-3.0.101-108.81.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-108.81.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", }, product_reference: "kernel-default-3.0.101-108.81.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-108.81.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.s390x", }, product_reference: "kernel-default-3.0.101-108.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-108.81.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", }, product_reference: "kernel-default-3.0.101-108.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", }, product_reference: "kernel-default-base-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-108.81.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", }, product_reference: "kernel-default-base-3.0.101-108.81.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-108.81.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", }, product_reference: "kernel-default-base-3.0.101-108.81.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-108.81.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", }, product_reference: "kernel-default-base-3.0.101-108.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-108.81.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", }, product_reference: "kernel-default-base-3.0.101-108.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", }, product_reference: "kernel-default-devel-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-108.81.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", }, product_reference: "kernel-default-devel-3.0.101-108.81.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-108.81.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", }, product_reference: "kernel-default-devel-3.0.101-108.81.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-108.81.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", }, product_reference: "kernel-default-devel-3.0.101-108.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-108.81.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", }, product_reference: "kernel-default-devel-3.0.101-108.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-3.0.101-108.81.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", }, product_reference: "kernel-default-man-3.0.101-108.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", }, product_reference: "kernel-ec2-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-3.0.101-108.81.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", }, product_reference: "kernel-ec2-3.0.101-108.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-base-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", }, product_reference: "kernel-ec2-base-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-base-3.0.101-108.81.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", }, product_reference: "kernel-ec2-base-3.0.101-108.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-devel-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", }, product_reference: "kernel-ec2-devel-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-devel-3.0.101-108.81.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", }, product_reference: "kernel-ec2-devel-3.0.101-108.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-pae-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.81.1.i586", }, product_reference: "kernel-pae-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-pae-base-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", }, product_reference: "kernel-pae-base-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-pae-devel-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", }, product_reference: "kernel-pae-devel-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ppc64-3.0.101-108.81.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", }, product_reference: "kernel-ppc64-3.0.101-108.81.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ppc64-base-3.0.101-108.81.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", }, product_reference: "kernel-ppc64-base-3.0.101-108.81.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-ppc64-devel-3.0.101-108.81.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", }, product_reference: "kernel-ppc64-devel-3.0.101-108.81.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.i586", }, product_reference: "kernel-source-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-108.81.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ia64", }, product_reference: "kernel-source-3.0.101-108.81.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-108.81.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", }, product_reference: "kernel-source-3.0.101-108.81.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-108.81.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.s390x", }, product_reference: "kernel-source-3.0.101-108.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-108.81.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", }, product_reference: "kernel-source-3.0.101-108.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.i586", }, product_reference: "kernel-syms-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-108.81.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", }, product_reference: "kernel-syms-3.0.101-108.81.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-108.81.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", }, product_reference: "kernel-syms-3.0.101-108.81.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-108.81.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", }, product_reference: "kernel-syms-3.0.101-108.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-108.81.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", }, product_reference: "kernel-syms-3.0.101-108.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.i586", }, product_reference: "kernel-trace-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-108.81.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", }, product_reference: "kernel-trace-3.0.101-108.81.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-108.81.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", }, product_reference: "kernel-trace-3.0.101-108.81.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-108.81.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", }, product_reference: "kernel-trace-3.0.101-108.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-108.81.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", }, product_reference: "kernel-trace-3.0.101-108.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", }, product_reference: "kernel-trace-base-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-108.81.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", }, product_reference: "kernel-trace-base-3.0.101-108.81.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-108.81.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", }, product_reference: "kernel-trace-base-3.0.101-108.81.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-108.81.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", }, product_reference: "kernel-trace-base-3.0.101-108.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-108.81.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", }, product_reference: "kernel-trace-base-3.0.101-108.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", }, product_reference: "kernel-trace-devel-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-108.81.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", }, product_reference: "kernel-trace-devel-3.0.101-108.81.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-108.81.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", }, product_reference: "kernel-trace-devel-3.0.101-108.81.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-108.81.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", }, product_reference: "kernel-trace-devel-3.0.101-108.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-108.81.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", }, product_reference: "kernel-trace-devel-3.0.101-108.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.i586", }, product_reference: "kernel-xen-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.0.101-108.81.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", }, product_reference: "kernel-xen-3.0.101-108.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", }, product_reference: "kernel-xen-base-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.0.101-108.81.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", }, product_reference: "kernel-xen-base-3.0.101-108.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.0.101-108.81.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", }, product_reference: "kernel-xen-devel-3.0.101-108.81.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.0.101-108.81.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", }, product_reference: "kernel-xen-devel-3.0.101-108.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, ], }, vulnerabilities: [ { cve: "CVE-2017-1000407", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000407", }, ], notes: [ { category: "general", text: "The Linux Kernel 2.6.32 and later are affected by a denial of service, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.81.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2017-1000407", url: "https://www.suse.com/security/cve/CVE-2017-1000407", }, { category: "external", summary: "SUSE Bug 1071021 for CVE-2017-1000407", url: "https://bugzilla.suse.com/1071021", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.81.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.81.1.noarch", ], }, ], threats: [ { category: "impact", date: "2018-11-13T07:16:15Z", details: "moderate", }, ], title: "CVE-2017-1000407", }, { cve: "CVE-2017-16533", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16533", }, ], notes: [ { category: "general", text: "The usbhid_parse function in drivers/hid/usbhid/hid-core.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.81.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2017-16533", url: "https://www.suse.com/security/cve/CVE-2017-16533", }, { category: "external", summary: "SUSE Bug 1066674 for CVE-2017-16533", url: "https://bugzilla.suse.com/1066674", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2017-16533", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2017-16533", url: "https://bugzilla.suse.com/1146519", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.81.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.81.1.noarch", ], }, ], threats: [ { category: "impact", date: "2018-11-13T07:16:15Z", details: "moderate", }, ], title: "CVE-2017-16533", }, { cve: "CVE-2017-7273", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7273", }, ], notes: [ { category: "general", text: "The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 3.2 and 4.x before 4.9.4 allows physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.81.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2017-7273", url: "https://www.suse.com/security/cve/CVE-2017-7273", }, { category: "external", summary: "SUSE Bug 1031240 for CVE-2017-7273", url: "https://bugzilla.suse.com/1031240", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.81.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.81.1.noarch", ], }, ], threats: [ { category: "impact", date: "2018-11-13T07:16:15Z", details: "moderate", }, ], title: "CVE-2017-7273", }, { cve: "CVE-2018-14633", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14633", }, ], notes: [ { category: "general", text: "A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.81.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-14633", url: "https://www.suse.com/security/cve/CVE-2018-14633", }, { category: "external", summary: "SUSE Bug 1107829 for CVE-2018-14633", url: "https://bugzilla.suse.com/1107829", }, { category: "external", summary: "SUSE Bug 1107832 for CVE-2018-14633", url: "https://bugzilla.suse.com/1107832", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.81.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.81.1.noarch", ], }, ], threats: [ { category: "impact", date: "2018-11-13T07:16:15Z", details: "important", }, ], title: "CVE-2018-14633", }, { cve: "CVE-2018-18281", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18281", }, ], notes: [ { category: "general", text: "Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. This is fixed in the following kernel versions: 4.9.135, 4.14.78, 4.18.16, 4.19.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.81.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-18281", url: "https://www.suse.com/security/cve/CVE-2018-18281", }, { category: "external", summary: "SUSE Bug 1113769 for CVE-2018-18281", url: "https://bugzilla.suse.com/1113769", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.81.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.81.1.noarch", ], }, ], threats: [ { category: "impact", date: "2018-11-13T07:16:15Z", details: "moderate", }, ], title: "CVE-2018-18281", }, { cve: "CVE-2018-18386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18386", }, ], notes: [ { category: "general", text: "drivers/tty/n_tty.c in the Linux kernel before 4.14.11 allows local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.81.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-18386", url: "https://www.suse.com/security/cve/CVE-2018-18386", }, { category: "external", summary: "SUSE Bug 1094825 for CVE-2018-18386", url: "https://bugzilla.suse.com/1094825", }, { category: "external", summary: "SUSE Bug 1112039 for CVE-2018-18386", url: "https://bugzilla.suse.com/1112039", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.81.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.81.1.noarch", ], }, ], threats: [ { category: "impact", date: "2018-11-13T07:16:15Z", details: "moderate", }, ], title: "CVE-2018-18386", }, { cve: "CVE-2018-18710", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18710", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.81.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-18710", url: "https://www.suse.com/security/cve/CVE-2018-18710", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-18710", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.81.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.81.1.noarch", ], }, ], threats: [ { category: "impact", date: "2018-11-13T07:16:15Z", details: "moderate", }, ], title: "CVE-2018-18710", }, { cve: "CVE-2018-9516", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-9516", }, ], notes: [ { category: "general", text: "In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-71361580.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.81.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-9516", url: "https://www.suse.com/security/cve/CVE-2018-9516", }, { category: "external", summary: "SUSE Bug 1108498 for CVE-2018-9516", url: "https://bugzilla.suse.com/1108498", }, { category: "external", summary: "SUSE Bug 1123161 for CVE-2018-9516", url: "https://bugzilla.suse.com/1123161", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.81.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.81.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.81.1.noarch", ], }, ], threats: [ { category: "impact", date: "2018-11-13T07:16:15Z", details: "moderate", }, ], title: "CVE-2018-9516", }, ], }
suse-su-2019:1289-1
Vulnerability from csaf_suse
Published
2019-05-28 11:38
Modified
2019-05-28 11:38
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 LTSS kernel was updated to receive various security and bugfixes.
Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)
- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
This kernel update contains software mitigations for these issues, which also utilize CPU microcode updates shipped in parallel.
For more information on this set of information leaks, check out https://www.suse.com/support/kb/doc/?id=7023736
The following security bugs were fixed:
- CVE-2016-10741: fs/xfs/xfs_aops.c allowed local users to cause a denial of service (system crash) because there is a race condition between direct and memory-mapped I/O (associated with a hole) that is handled with BUG_ON instead of an I/O failure (bnc#1114920 bnc#1124010).
- CVE-2017-1000407: By flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic (bnc#1071021).
- CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674).
- CVE-2017-7273: The cp_report_fixup function in drivers/hid/hid-cypress.c allowed physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report (bnc#1031240).
- CVE-2017-7472: The KEYS subsystem allowed local users to cause a denial of service (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls (bnc#1034862).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. (bnc#1107829).
- CVE-2018-15572: The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c did not always fill RSB upon a context switch, which made it easier for attackers to conduct userspace-userspace spectreRSB attacks (bnc#1102517 bnc#1105296).
- CVE-2018-16884: NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bnc#1119946).
- CVE-2018-18281: The mremap() syscall performed TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).
- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).
- CVE-2018-18690: A local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE operations with conversion of an attr from short to long form (bnc#1105025).
- CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).
- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized (bnc#1116841).
- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).
- CVE-2018-19985: The function hso_get_config_data in drivers/net/usb/hso.c read if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allowed arbitrary read in the kernel address space (bnc#1120743).
- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).
- CVE-2018-5391: The Linux kernel was vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size (bnc#1103097).
- CVE-2018-9516: In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. (bnc#1108498).
- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bnc#1118319).
- CVE-2019-11486: The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c had multiple race conditions (bnc#1133188). The line discipline was disabled.
- CVE-2019-3459: A heap address information leak while using L2CAP_GET_CONF_OPT was discovered (bnc#1120758).
- CVE-2019-3460: A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found (bnc#1120758).
- CVE-2019-3882: A flaw was found vfio interface implementation that permitted violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). (bnc#1131416 bnc#1131427).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bnc#1124728).
- CVE-2019-7221: The KVM implementation had a Use-after-Free (bnc#1124732).
- CVE-2019-7222: The KVM implementation had an Information Leak (bnc#1124735).
- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).
- CVE-2019-9503: Multiple brcmfmac frame validation bypasses have been fixed (bnc#1132828).
The following non-security bugs were fixed:
- cifs: Check for timeout on Negotiate stage (bsc#1091171 bsc#1126890).
- fix pgd underflow (bnc#1104475) (bsc#1104475, bsc#1110768).
- kvm: x86: Report STIBP on GET_SUPPORTED_CPUID (bsc#1111331).
- locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a new <linux/bits.h> file (bsc#1111331).
- net: ipv4: do not handle duplicate fragments as overlapping (bsc#1116345).
- sched/core: Optimize SCHED_SMT (bsc#1111331)
- sched/smt: Expose sched_smt_present static key (bsc#1106913).
- sched/smt: Make sched_smt_present track topology (bsc#1106913).
- sched/smt: Update sched_smt_present at runtime (bsc#1111331)
- tcp: prevent bogus FRTO undos with non-SACK flows (bsc#1086535).
- x86/bugs: Rename SSBD_NO to SSB_NO (bsc#1111331)
- x86/cpu: Sanitize FAM6_ATOM naming (bsc#1111331).
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bsc#1111331).
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active (bsc#1111331).
- x86/mce: Improve error message when kernel cannot recover, p2 (bsc#1114648).
- x86/msr-index: Cleanup bit defines (bsc#1111331).
- x86/spec_ctrl: Fix spec_ctrl reporting (bsc#1106913, bsc#1111516).
- x86/speculation: Apply IBPB more strictly to avoid cross-process data leak (bsc#1106913).
- x86/speculation: Consolidate CPU whitelists (bsc#1111331).
- x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation (bsc#1106913).
- x86/speculation/mds: Add basic bug infrastructure for MDS (bsc#1111331).
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bsc#1111331).
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bsc#1111331).
- x86/speculation/mds: Add mitigation control for MDS (bsc#1111331).
- x86/speculation/mds: Add mitigation mode VMWERV (bsc#1111331).
- x86/speculation/mds: Add sysfs reporting for MDS (bsc#1111331).
- x86/speculation/mds: Clear CPU buffers on exit to user (bsc#1111331).
- x86/speculation/mds: Conditionally clear CPU buffers on idle entry (bsc#1111331).
- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1111331).
- x86/speculation: Rework SMT state change (bsc#1111331).
- x86/speculation: Simplify the CPU bug detection logic (bsc#1111331).
- x86/uaccess: Do not leak the AC flag into __put_user() value evaluation (bsc#1114648).
- xfs: do not BUG() on mixed direct and mapped I/O (bsc#1114920).
- xfs: fix quotacheck dquot id overflow infinite loop (bsc#1121621).
- xfs: stop searching for free slots in an inode chunk when there are none (bsc#1115007).
- xfs: xfs_iget_check_free_state: Use correct sign for errors (bsc#1122015, bsc#1100001).
- xfs: validate sb_logsunit is a multiple of the fs blocksize (bsc#1115038).
Patchnames
SUSE-2019-1289,SUSE-SLE-Module-Public-Cloud-12-2019-1289,SUSE-SLE-SAP-12-SP1-2019-1289,SUSE-SLE-SERVER-12-SP1-2019-1289
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\n\nThe SUSE Linux Enterprise 12 SP1 LTSS kernel was updated to receive various security and bugfixes.\n\nFour new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)\n\n- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)\n- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)\n- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)\n- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)\n\nThis kernel update contains software mitigations for these issues, which also utilize CPU microcode updates shipped in parallel.\n\nFor more information on this set of information leaks, check out https://www.suse.com/support/kb/doc/?id=7023736\n\nThe following security bugs were fixed:\n\n- CVE-2016-10741: fs/xfs/xfs_aops.c allowed local users to cause a denial of service (system crash) because there is a race condition between direct and memory-mapped I/O (associated with a hole) that is handled with BUG_ON instead of an I/O failure (bnc#1114920 bnc#1124010).\n- CVE-2017-1000407: By flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic (bnc#1071021).\n- CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674).\n- CVE-2017-7273: The cp_report_fixup function in drivers/hid/hid-cypress.c allowed physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report (bnc#1031240).\n- CVE-2017-7472: The KEYS subsystem allowed local users to cause a denial of service (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls (bnc#1034862).\n- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. (bnc#1107829).\n- CVE-2018-15572: The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c did not always fill RSB upon a context switch, which made it easier for attackers to conduct userspace-userspace spectreRSB attacks (bnc#1102517 bnc#1105296).\n- CVE-2018-16884: NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bnc#1119946).\n- CVE-2018-18281: The mremap() syscall performed TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).\n- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).\n- CVE-2018-18690: A local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE operations with conversion of an attr from short to long form (bnc#1105025).\n- CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).\n- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized (bnc#1116841).\n- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).\n- CVE-2018-19985: The function hso_get_config_data in drivers/net/usb/hso.c read if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allowed arbitrary read in the kernel address space (bnc#1120743).\n- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).\n- CVE-2018-5391: The Linux kernel was vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size (bnc#1103097).\n- CVE-2018-9516: In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. (bnc#1108498).\n- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bnc#1118319).\n- CVE-2019-11486: The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c had multiple race conditions (bnc#1133188). The line discipline was disabled.\n- CVE-2019-3459: A heap address information leak while using L2CAP_GET_CONF_OPT was discovered (bnc#1120758).\n- CVE-2019-3460: A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found (bnc#1120758).\n- CVE-2019-3882: A flaw was found vfio interface implementation that permitted violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). (bnc#1131416 bnc#1131427).\n- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bnc#1124728).\n- CVE-2019-7221: The KVM implementation had a Use-after-Free (bnc#1124732).\n- CVE-2019-7222: The KVM implementation had an Information Leak (bnc#1124735).\n- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).\n- CVE-2019-9503: Multiple brcmfmac frame validation bypasses have been fixed (bnc#1132828).\n\nThe following non-security bugs were fixed:\n\n- cifs: Check for timeout on Negotiate stage (bsc#1091171 bsc#1126890).\n- fix pgd underflow (bnc#1104475) (bsc#1104475, bsc#1110768).\n- kvm: x86: Report STIBP on GET_SUPPORTED_CPUID (bsc#1111331).\n- locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a new <linux/bits.h> file (bsc#1111331).\n- net: ipv4: do not handle duplicate fragments as overlapping (bsc#1116345).\n- sched/core: Optimize SCHED_SMT (bsc#1111331)\n- sched/smt: Expose sched_smt_present static key (bsc#1106913).\n- sched/smt: Make sched_smt_present track topology (bsc#1106913).\n- sched/smt: Update sched_smt_present at runtime (bsc#1111331)\n- tcp: prevent bogus FRTO undos with non-SACK flows (bsc#1086535).\n- x86/bugs: Rename SSBD_NO to SSB_NO (bsc#1111331)\n- x86/cpu: Sanitize FAM6_ATOM naming (bsc#1111331).\n- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bsc#1111331).\n- x86/kvm/vmx: Add MDS protection when L1D Flush is not active (bsc#1111331).\n- x86/mce: Improve error message when kernel cannot recover, p2 (bsc#1114648).\n- x86/msr-index: Cleanup bit defines (bsc#1111331).\n- x86/spec_ctrl: Fix spec_ctrl reporting (bsc#1106913, bsc#1111516).\n- x86/speculation: Apply IBPB more strictly to avoid cross-process data leak (bsc#1106913).\n- x86/speculation: Consolidate CPU whitelists (bsc#1111331).\n- x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation (bsc#1106913).\n- x86/speculation/mds: Add basic bug infrastructure for MDS (bsc#1111331).\n- x86/speculation/mds: Add BUG_MSBDS_ONLY (bsc#1111331).\n- x86/speculation/mds: Add mds_clear_cpu_buffers() (bsc#1111331).\n- x86/speculation/mds: Add mitigation control for MDS (bsc#1111331).\n- x86/speculation/mds: Add mitigation mode VMWERV (bsc#1111331).\n- x86/speculation/mds: Add sysfs reporting for MDS (bsc#1111331).\n- x86/speculation/mds: Clear CPU buffers on exit to user (bsc#1111331).\n- x86/speculation/mds: Conditionally clear CPU buffers on idle entry (bsc#1111331).\n- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1111331).\n- x86/speculation: Rework SMT state change (bsc#1111331).\n- x86/speculation: Simplify the CPU bug detection logic (bsc#1111331).\n- x86/uaccess: Do not leak the AC flag into __put_user() value evaluation (bsc#1114648).\n- xfs: do not BUG() on mixed direct and mapped I/O (bsc#1114920).\n- xfs: fix quotacheck dquot id overflow infinite loop (bsc#1121621).\n- xfs: stop searching for free slots in an inode chunk when there are none (bsc#1115007).\n- xfs: xfs_iget_check_free_state: Use correct sign for errors (bsc#1122015, bsc#1100001).\n- xfs: validate sb_logsunit is a multiple of the fs blocksize (bsc#1115038).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-1289,SUSE-SLE-Module-Public-Cloud-12-2019-1289,SUSE-SLE-SAP-12-SP1-2019-1289,SUSE-SLE-SERVER-12-SP1-2019-1289", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1289-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:1289-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20191289-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:1289-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html", }, { category: "self", summary: "SUSE Bug 1031240", url: "https://bugzilla.suse.com/1031240", }, { category: "self", summary: "SUSE Bug 1034862", url: "https://bugzilla.suse.com/1034862", }, { category: "self", summary: "SUSE Bug 1066674", url: "https://bugzilla.suse.com/1066674", }, { category: "self", summary: "SUSE Bug 1071021", url: "https://bugzilla.suse.com/1071021", }, { category: "self", summary: "SUSE Bug 1086535", url: "https://bugzilla.suse.com/1086535", }, { category: "self", summary: "SUSE Bug 1091171", url: "https://bugzilla.suse.com/1091171", }, { category: "self", summary: "SUSE Bug 1094825", url: "https://bugzilla.suse.com/1094825", }, { category: "self", summary: "SUSE Bug 1100001", url: "https://bugzilla.suse.com/1100001", }, { category: "self", summary: "SUSE Bug 1102517", url: "https://bugzilla.suse.com/1102517", }, { category: "self", summary: "SUSE Bug 1103097", url: "https://bugzilla.suse.com/1103097", }, { category: "self", summary: "SUSE Bug 1104475", url: "https://bugzilla.suse.com/1104475", }, { category: "self", summary: "SUSE Bug 1105025", url: "https://bugzilla.suse.com/1105025", }, { category: "self", summary: "SUSE Bug 1105296", url: "https://bugzilla.suse.com/1105296", }, { category: "self", summary: "SUSE Bug 1106913", url: "https://bugzilla.suse.com/1106913", }, { category: "self", summary: "SUSE Bug 1107829", url: "https://bugzilla.suse.com/1107829", }, { category: "self", summary: "SUSE Bug 1108498", url: "https://bugzilla.suse.com/1108498", }, { category: "self", summary: "SUSE Bug 1110768", url: "https://bugzilla.suse.com/1110768", }, { category: "self", summary: "SUSE Bug 1111331", url: "https://bugzilla.suse.com/1111331", }, { category: "self", summary: "SUSE Bug 1111516", url: "https://bugzilla.suse.com/1111516", }, { category: "self", summary: "SUSE Bug 1113751", url: "https://bugzilla.suse.com/1113751", }, { category: "self", summary: "SUSE Bug 1113769", url: "https://bugzilla.suse.com/1113769", }, { category: "self", summary: "SUSE Bug 1114648", url: "https://bugzilla.suse.com/1114648", }, { category: "self", summary: "SUSE Bug 1114920", url: "https://bugzilla.suse.com/1114920", }, { category: "self", summary: "SUSE Bug 1115007", url: "https://bugzilla.suse.com/1115007", }, { category: "self", summary: "SUSE Bug 1115038", url: "https://bugzilla.suse.com/1115038", }, { category: "self", summary: "SUSE Bug 1116345", url: "https://bugzilla.suse.com/1116345", }, { category: "self", summary: "SUSE Bug 1116841", url: "https://bugzilla.suse.com/1116841", }, { category: "self", summary: "SUSE Bug 1118152", url: "https://bugzilla.suse.com/1118152", }, { category: "self", summary: "SUSE Bug 1118319", url: "https://bugzilla.suse.com/1118319", }, { category: "self", summary: "SUSE Bug 1119714", url: "https://bugzilla.suse.com/1119714", }, { category: "self", summary: "SUSE Bug 1119946", url: "https://bugzilla.suse.com/1119946", }, { category: "self", summary: "SUSE Bug 1120743", url: "https://bugzilla.suse.com/1120743", }, { category: "self", summary: "SUSE Bug 1120758", url: "https://bugzilla.suse.com/1120758", }, { category: "self", summary: "SUSE Bug 1121621", url: "https://bugzilla.suse.com/1121621", }, { category: "self", summary: "SUSE Bug 1122015", url: "https://bugzilla.suse.com/1122015", }, { category: "self", summary: "SUSE Bug 1123161", url: "https://bugzilla.suse.com/1123161", }, { category: "self", summary: "SUSE Bug 1124010", url: "https://bugzilla.suse.com/1124010", }, { category: "self", summary: "SUSE Bug 1124728", url: "https://bugzilla.suse.com/1124728", }, { category: "self", summary: "SUSE Bug 1124732", url: "https://bugzilla.suse.com/1124732", }, { category: "self", summary: "SUSE Bug 1124735", url: "https://bugzilla.suse.com/1124735", }, { category: "self", summary: "SUSE Bug 1126890", url: "https://bugzilla.suse.com/1126890", }, { category: "self", summary: "SUSE Bug 1128166", url: "https://bugzilla.suse.com/1128166", }, { category: "self", summary: "SUSE Bug 1131416", url: "https://bugzilla.suse.com/1131416", }, { category: "self", summary: "SUSE Bug 1131427", url: "https://bugzilla.suse.com/1131427", }, { category: "self", summary: "SUSE Bug 1132828", url: "https://bugzilla.suse.com/1132828", }, { category: "self", summary: "SUSE Bug 1133188", url: "https://bugzilla.suse.com/1133188", }, { category: "self", summary: "SUSE CVE CVE-2016-10741 page", url: "https://www.suse.com/security/cve/CVE-2016-10741/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000407 page", url: "https://www.suse.com/security/cve/CVE-2017-1000407/", }, { category: "self", summary: "SUSE CVE CVE-2017-16533 page", url: "https://www.suse.com/security/cve/CVE-2017-16533/", }, { category: "self", summary: "SUSE CVE CVE-2017-7273 page", url: "https://www.suse.com/security/cve/CVE-2017-7273/", }, { category: "self", summary: "SUSE CVE CVE-2017-7472 page", url: "https://www.suse.com/security/cve/CVE-2017-7472/", }, { category: "self", summary: "SUSE CVE CVE-2018-12126 page", url: "https://www.suse.com/security/cve/CVE-2018-12126/", }, { category: "self", summary: "SUSE CVE CVE-2018-12127 page", url: "https://www.suse.com/security/cve/CVE-2018-12127/", }, { category: "self", summary: "SUSE CVE CVE-2018-12130 page", url: "https://www.suse.com/security/cve/CVE-2018-12130/", }, { category: "self", summary: "SUSE CVE CVE-2018-14633 page", url: "https://www.suse.com/security/cve/CVE-2018-14633/", }, { category: "self", summary: "SUSE CVE CVE-2018-15572 page", url: "https://www.suse.com/security/cve/CVE-2018-15572/", }, { category: "self", summary: "SUSE CVE CVE-2018-16884 page", url: "https://www.suse.com/security/cve/CVE-2018-16884/", }, { category: "self", summary: "SUSE CVE CVE-2018-18281 page", url: "https://www.suse.com/security/cve/CVE-2018-18281/", }, { category: "self", summary: "SUSE CVE CVE-2018-18386 page", url: "https://www.suse.com/security/cve/CVE-2018-18386/", }, { category: "self", summary: "SUSE CVE CVE-2018-18690 page", url: "https://www.suse.com/security/cve/CVE-2018-18690/", }, { category: "self", summary: "SUSE CVE CVE-2018-18710 page", url: "https://www.suse.com/security/cve/CVE-2018-18710/", }, { category: "self", summary: "SUSE CVE CVE-2018-19407 page", url: "https://www.suse.com/security/cve/CVE-2018-19407/", }, { category: "self", summary: "SUSE CVE CVE-2018-19824 page", url: "https://www.suse.com/security/cve/CVE-2018-19824/", }, { category: "self", summary: "SUSE CVE CVE-2018-19985 page", url: "https://www.suse.com/security/cve/CVE-2018-19985/", }, { category: "self", summary: "SUSE CVE CVE-2018-20169 page", url: "https://www.suse.com/security/cve/CVE-2018-20169/", }, { category: "self", summary: "SUSE CVE CVE-2018-5391 page", url: "https://www.suse.com/security/cve/CVE-2018-5391/", }, { category: "self", summary: "SUSE CVE CVE-2018-9516 page", url: "https://www.suse.com/security/cve/CVE-2018-9516/", }, { category: "self", summary: "SUSE CVE CVE-2018-9568 page", url: "https://www.suse.com/security/cve/CVE-2018-9568/", }, { category: "self", summary: "SUSE CVE CVE-2019-11091 page", url: "https://www.suse.com/security/cve/CVE-2019-11091/", }, { category: "self", summary: "SUSE CVE CVE-2019-11486 page", url: "https://www.suse.com/security/cve/CVE-2019-11486/", }, { category: "self", summary: "SUSE CVE CVE-2019-3459 page", url: "https://www.suse.com/security/cve/CVE-2019-3459/", }, { category: "self", summary: "SUSE CVE CVE-2019-3460 page", url: "https://www.suse.com/security/cve/CVE-2019-3460/", }, { category: "self", summary: "SUSE CVE CVE-2019-3882 page", url: "https://www.suse.com/security/cve/CVE-2019-3882/", }, { category: "self", summary: "SUSE CVE CVE-2019-6974 page", url: "https://www.suse.com/security/cve/CVE-2019-6974/", }, { category: "self", summary: "SUSE CVE CVE-2019-7221 page", url: "https://www.suse.com/security/cve/CVE-2019-7221/", }, { category: "self", summary: "SUSE CVE CVE-2019-7222 page", url: "https://www.suse.com/security/cve/CVE-2019-7222/", }, { category: "self", summary: "SUSE CVE CVE-2019-8564 page", url: "https://www.suse.com/security/cve/CVE-2019-8564/", }, { category: "self", summary: "SUSE CVE CVE-2019-9213 page", url: "https://www.suse.com/security/cve/CVE-2019-9213/", }, { category: "self", summary: "SUSE CVE CVE-2019-9503 page", url: "https://www.suse.com/security/cve/CVE-2019-9503/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2019-05-28T11:38:31Z", generator: { date: "2019-05-28T11:38:31Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:1289-1", initial_release_date: "2019-05-28T11:38:31Z", revision_history: [ { date: "2019-05-28T11:38:31Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-3.12.74-60.64.110.1.noarch", product: { name: "kernel-devel-3.12.74-60.64.110.1.noarch", product_id: "kernel-devel-3.12.74-60.64.110.1.noarch", }, }, { category: "product_version", name: "kernel-docs-3.12.74-60.64.110.1.noarch", product: { name: "kernel-docs-3.12.74-60.64.110.1.noarch", product_id: "kernel-docs-3.12.74-60.64.110.1.noarch", }, }, { category: "product_version", name: "kernel-macros-3.12.74-60.64.110.1.noarch", product: { name: "kernel-macros-3.12.74-60.64.110.1.noarch", product_id: "kernel-macros-3.12.74-60.64.110.1.noarch", }, }, { category: "product_version", name: "kernel-source-3.12.74-60.64.110.1.noarch", product: { name: "kernel-source-3.12.74-60.64.110.1.noarch", product_id: "kernel-source-3.12.74-60.64.110.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-3.12.74-60.64.110.1.noarch", product: { name: "kernel-source-vanilla-3.12.74-60.64.110.1.noarch", product_id: "kernel-source-vanilla-3.12.74-60.64.110.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-debug-3.12.74-60.64.110.1.ppc64le", product: { name: "kernel-debug-3.12.74-60.64.110.1.ppc64le", product_id: "kernel-debug-3.12.74-60.64.110.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-base-3.12.74-60.64.110.1.ppc64le", product: { name: "kernel-debug-base-3.12.74-60.64.110.1.ppc64le", product_id: "kernel-debug-base-3.12.74-60.64.110.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-3.12.74-60.64.110.1.ppc64le", product: { name: "kernel-debug-devel-3.12.74-60.64.110.1.ppc64le", product_id: "kernel-debug-devel-3.12.74-60.64.110.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-extra-3.12.74-60.64.110.1.ppc64le", product: { name: "kernel-debug-extra-3.12.74-60.64.110.1.ppc64le", product_id: "kernel-debug-extra-3.12.74-60.64.110.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-3.12.74-60.64.110.1.ppc64le", product: { name: "kernel-default-3.12.74-60.64.110.1.ppc64le", product_id: "kernel-default-3.12.74-60.64.110.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-3.12.74-60.64.110.1.ppc64le", product: { name: "kernel-default-base-3.12.74-60.64.110.1.ppc64le", product_id: "kernel-default-base-3.12.74-60.64.110.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-3.12.74-60.64.110.1.ppc64le", product: { name: "kernel-default-devel-3.12.74-60.64.110.1.ppc64le", product_id: "kernel-default-devel-3.12.74-60.64.110.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-3.12.74-60.64.110.1.ppc64le", product: { name: "kernel-default-extra-3.12.74-60.64.110.1.ppc64le", product_id: "kernel-default-extra-3.12.74-60.64.110.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-3.12.74-60.64.110.1.ppc64le", product: { name: "kernel-obs-build-3.12.74-60.64.110.1.ppc64le", product_id: "kernel-obs-build-3.12.74-60.64.110.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-3.12.74-60.64.110.1.ppc64le", product: { name: "kernel-obs-qa-3.12.74-60.64.110.1.ppc64le", product_id: "kernel-obs-qa-3.12.74-60.64.110.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-3.12.74-60.64.110.1.ppc64le", product: { name: "kernel-syms-3.12.74-60.64.110.1.ppc64le", product_id: "kernel-syms-3.12.74-60.64.110.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kernel-default-3.12.74-60.64.110.1.s390x", product: { name: "kernel-default-3.12.74-60.64.110.1.s390x", product_id: "kernel-default-3.12.74-60.64.110.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-3.12.74-60.64.110.1.s390x", product: { name: "kernel-default-base-3.12.74-60.64.110.1.s390x", product_id: "kernel-default-base-3.12.74-60.64.110.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-3.12.74-60.64.110.1.s390x", product: { name: "kernel-default-devel-3.12.74-60.64.110.1.s390x", product_id: "kernel-default-devel-3.12.74-60.64.110.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-3.12.74-60.64.110.1.s390x", product: { name: "kernel-default-extra-3.12.74-60.64.110.1.s390x", product_id: "kernel-default-extra-3.12.74-60.64.110.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-3.12.74-60.64.110.1.s390x", product: { name: "kernel-default-man-3.12.74-60.64.110.1.s390x", product_id: "kernel-default-man-3.12.74-60.64.110.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-3.12.74-60.64.110.1.s390x", product: { name: "kernel-obs-build-3.12.74-60.64.110.1.s390x", product_id: "kernel-obs-build-3.12.74-60.64.110.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-3.12.74-60.64.110.1.s390x", product: { name: "kernel-obs-qa-3.12.74-60.64.110.1.s390x", product_id: "kernel-obs-qa-3.12.74-60.64.110.1.s390x", }, }, { category: "product_version", name: "kernel-syms-3.12.74-60.64.110.1.s390x", product: { name: "kernel-syms-3.12.74-60.64.110.1.s390x", product_id: "kernel-syms-3.12.74-60.64.110.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-3.12.74-60.64.110.1.s390x", product: { name: "kernel-vanilla-3.12.74-60.64.110.1.s390x", product_id: "kernel-vanilla-3.12.74-60.64.110.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-devel-3.12.74-60.64.110.1.s390x", product: { name: "kernel-vanilla-devel-3.12.74-60.64.110.1.s390x", product_id: "kernel-vanilla-devel-3.12.74-60.64.110.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-3.12.74-60.64.110.1.s390x", product: { name: "kernel-zfcpdump-3.12.74-60.64.110.1.s390x", product_id: "kernel-zfcpdump-3.12.74-60.64.110.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "kernel-debug-3.12.74-60.64.110.1.x86_64", product: { name: "kernel-debug-3.12.74-60.64.110.1.x86_64", product_id: "kernel-debug-3.12.74-60.64.110.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-base-3.12.74-60.64.110.1.x86_64", product: { name: "kernel-debug-base-3.12.74-60.64.110.1.x86_64", product_id: "kernel-debug-base-3.12.74-60.64.110.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-3.12.74-60.64.110.1.x86_64", product: { name: "kernel-debug-devel-3.12.74-60.64.110.1.x86_64", product_id: "kernel-debug-devel-3.12.74-60.64.110.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-extra-3.12.74-60.64.110.1.x86_64", product: { name: "kernel-debug-extra-3.12.74-60.64.110.1.x86_64", product_id: "kernel-debug-extra-3.12.74-60.64.110.1.x86_64", }, }, { category: "product_version", name: "kernel-default-3.12.74-60.64.110.1.x86_64", product: { name: "kernel-default-3.12.74-60.64.110.1.x86_64", product_id: "kernel-default-3.12.74-60.64.110.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-3.12.74-60.64.110.1.x86_64", product: { name: "kernel-default-base-3.12.74-60.64.110.1.x86_64", product_id: "kernel-default-base-3.12.74-60.64.110.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-3.12.74-60.64.110.1.x86_64", product: { name: "kernel-default-devel-3.12.74-60.64.110.1.x86_64", product_id: "kernel-default-devel-3.12.74-60.64.110.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-3.12.74-60.64.110.1.x86_64", product: { name: "kernel-default-extra-3.12.74-60.64.110.1.x86_64", product_id: "kernel-default-extra-3.12.74-60.64.110.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-3.12.74-60.64.110.1.x86_64", product: { name: "kernel-ec2-3.12.74-60.64.110.1.x86_64", product_id: "kernel-ec2-3.12.74-60.64.110.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-base-3.12.74-60.64.110.1.x86_64", product: { name: "kernel-ec2-base-3.12.74-60.64.110.1.x86_64", product_id: "kernel-ec2-base-3.12.74-60.64.110.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", product: { name: "kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", product_id: "kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", product: { name: "kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", product_id: "kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-3.12.74-60.64.110.1.x86_64", product: { name: "kernel-obs-build-3.12.74-60.64.110.1.x86_64", product_id: "kernel-obs-build-3.12.74-60.64.110.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-3.12.74-60.64.110.1.x86_64", product: { name: "kernel-obs-qa-3.12.74-60.64.110.1.x86_64", product_id: "kernel-obs-qa-3.12.74-60.64.110.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-3.12.74-60.64.110.1.x86_64", product: { name: "kernel-syms-3.12.74-60.64.110.1.x86_64", product_id: "kernel-syms-3.12.74-60.64.110.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-3.12.74-60.64.110.1.x86_64", product: { name: "kernel-vanilla-3.12.74-60.64.110.1.x86_64", product_id: "kernel-vanilla-3.12.74-60.64.110.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-devel-3.12.74-60.64.110.1.x86_64", product: { name: "kernel-vanilla-devel-3.12.74-60.64.110.1.x86_64", product_id: "kernel-vanilla-devel-3.12.74-60.64.110.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-3.12.74-60.64.110.1.x86_64", product: { name: "kernel-xen-3.12.74-60.64.110.1.x86_64", product_id: "kernel-xen-3.12.74-60.64.110.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-base-3.12.74-60.64.110.1.x86_64", product: { name: "kernel-xen-base-3.12.74-60.64.110.1.x86_64", product_id: "kernel-xen-base-3.12.74-60.64.110.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-devel-3.12.74-60.64.110.1.x86_64", product: { name: "kernel-xen-devel-3.12.74-60.64.110.1.x86_64", product_id: "kernel-xen-devel-3.12.74-60.64.110.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-extra-3.12.74-60.64.110.1.x86_64", product: { name: "kernel-xen-extra-3.12.74-60.64.110.1.x86_64", product_id: "kernel-xen-extra-3.12.74-60.64.110.1.x86_64", }, }, { category: "product_version", name: "kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", product: { name: "kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", product_id: "kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", }, }, { category: "product_version", name: "kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", product: { name: "kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", product_id: "kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", }, }, { category: "product_version", name: "lttng-modules-2.7.0-4.4.1.x86_64", product: { name: "lttng-modules-2.7.0-4.4.1.x86_64", product_id: "lttng-modules-2.7.0-4.4.1.x86_64", }, }, { category: "product_version", name: "lttng-modules-kmp-compute-2.7.0_k3.12.49_2-4.4.1.x86_64", product: { name: "lttng-modules-kmp-compute-2.7.0_k3.12.49_2-4.4.1.x86_64", product_id: "lttng-modules-kmp-compute-2.7.0_k3.12.49_2-4.4.1.x86_64", }, }, { category: "product_version", name: "lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", product: { name: "lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", product_id: "lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", }, }, { category: "product_version", name: "lttng-modules-kmp-rt-2.7.0_k3.12.49_2-4.4.1.x86_64", product: { name: "lttng-modules-kmp-rt-2.7.0_k3.12.49_2-4.4.1.x86_64", product_id: "lttng-modules-kmp-rt-2.7.0_k3.12.49_2-4.4.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Public Cloud 12", product: { name: "SUSE Linux Enterprise Module for Public Cloud 12", product_id: "SUSE Linux Enterprise Module for Public Cloud 12", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-public-cloud:12", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP1-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-ec2-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", product_id: "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", }, product_reference: "kernel-ec2-3.12.74-60.64.110.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 12", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-devel-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", product_id: "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", }, product_reference: "kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 12", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-extra-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", product_id: "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", }, product_reference: "kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 12", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", }, product_reference: "kernel-default-3.12.74-60.64.110.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", }, product_reference: "kernel-default-base-3.12.74-60.64.110.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", }, product_reference: "kernel-default-devel-3.12.74-60.64.110.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-3.12.74-60.64.110.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", }, product_reference: "kernel-devel-3.12.74-60.64.110.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-3.12.74-60.64.110.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", }, product_reference: "kernel-macros-3.12.74-60.64.110.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.12.74-60.64.110.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", }, product_reference: "kernel-source-3.12.74-60.64.110.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", }, product_reference: "kernel-syms-3.12.74-60.64.110.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", }, product_reference: "kernel-xen-3.12.74-60.64.110.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", }, product_reference: "kernel-xen-base-3.12.74-60.64.110.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", }, product_reference: "kernel-xen-devel-3.12.74-60.64.110.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", }, product_reference: "kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", }, product_reference: "kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "lttng-modules-2.7.0-4.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", }, product_reference: "lttng-modules-2.7.0-4.4.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", }, product_reference: "lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.74-60.64.110.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", }, product_reference: "kernel-default-3.12.74-60.64.110.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.74-60.64.110.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", }, product_reference: "kernel-default-3.12.74-60.64.110.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", }, product_reference: "kernel-default-3.12.74-60.64.110.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.74-60.64.110.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", }, product_reference: "kernel-default-base-3.12.74-60.64.110.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.74-60.64.110.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", }, product_reference: "kernel-default-base-3.12.74-60.64.110.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", }, product_reference: "kernel-default-base-3.12.74-60.64.110.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.74-60.64.110.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", }, product_reference: "kernel-default-devel-3.12.74-60.64.110.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.74-60.64.110.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", }, product_reference: "kernel-default-devel-3.12.74-60.64.110.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", }, product_reference: "kernel-default-devel-3.12.74-60.64.110.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-3.12.74-60.64.110.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", }, product_reference: "kernel-default-man-3.12.74-60.64.110.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-3.12.74-60.64.110.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", }, product_reference: "kernel-devel-3.12.74-60.64.110.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-3.12.74-60.64.110.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", }, product_reference: "kernel-macros-3.12.74-60.64.110.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.12.74-60.64.110.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", }, product_reference: "kernel-source-3.12.74-60.64.110.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.74-60.64.110.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", }, product_reference: "kernel-syms-3.12.74-60.64.110.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.74-60.64.110.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", }, product_reference: "kernel-syms-3.12.74-60.64.110.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", }, product_reference: "kernel-syms-3.12.74-60.64.110.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", }, product_reference: "kernel-xen-3.12.74-60.64.110.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", }, product_reference: "kernel-xen-base-3.12.74-60.64.110.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", }, product_reference: "kernel-xen-devel-3.12.74-60.64.110.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", }, product_reference: "kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", }, product_reference: "kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "lttng-modules-2.7.0-4.4.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", }, product_reference: "lttng-modules-2.7.0-4.4.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", }, product_reference: "lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, ], }, vulnerabilities: [ { cve: "CVE-2016-10741", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-10741", }, ], notes: [ { category: "general", text: "In the Linux kernel before 4.9.3, fs/xfs/xfs_aops.c allows local users to cause a denial of service (system crash) because there is a race condition between direct and memory-mapped I/O (associated with a hole) that is handled with BUG_ON instead of an I/O failure.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-10741", url: "https://www.suse.com/security/cve/CVE-2016-10741", }, { category: "external", summary: "SUSE Bug 1114920 for CVE-2016-10741", url: "https://bugzilla.suse.com/1114920", }, { category: "external", summary: "SUSE Bug 1124010 for CVE-2016-10741", url: "https://bugzilla.suse.com/1124010", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "moderate", }, ], title: "CVE-2016-10741", }, { cve: "CVE-2017-1000407", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000407", }, ], notes: [ { category: "general", text: "The Linux Kernel 2.6.32 and later are affected by a denial of service, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000407", url: "https://www.suse.com/security/cve/CVE-2017-1000407", }, { category: "external", summary: "SUSE Bug 1071021 for CVE-2017-1000407", url: "https://bugzilla.suse.com/1071021", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "moderate", }, ], title: "CVE-2017-1000407", }, { cve: "CVE-2017-16533", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16533", }, ], notes: [ { category: "general", text: "The usbhid_parse function in drivers/hid/usbhid/hid-core.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16533", url: "https://www.suse.com/security/cve/CVE-2017-16533", }, { category: "external", summary: "SUSE Bug 1066674 for CVE-2017-16533", url: "https://bugzilla.suse.com/1066674", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2017-16533", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2017-16533", url: "https://bugzilla.suse.com/1146519", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "moderate", }, ], title: "CVE-2017-16533", }, { cve: "CVE-2017-7273", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7273", }, ], notes: [ { category: "general", text: "The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 3.2 and 4.x before 4.9.4 allows physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7273", url: "https://www.suse.com/security/cve/CVE-2017-7273", }, { category: "external", summary: "SUSE Bug 1031240 for CVE-2017-7273", url: "https://bugzilla.suse.com/1031240", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "moderate", }, ], title: "CVE-2017-7273", }, { cve: "CVE-2017-7472", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7472", }, ], notes: [ { category: "general", text: "The KEYS subsystem in the Linux kernel before 4.10.13 allows local users to cause a denial of service (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7472", url: "https://www.suse.com/security/cve/CVE-2017-7472", }, { category: "external", summary: "SUSE Bug 1034862 for CVE-2017-7472", url: "https://bugzilla.suse.com/1034862", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "moderate", }, ], title: "CVE-2017-7472", }, { cve: "CVE-2018-12126", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-12126", }, ], notes: [ { category: "general", text: "Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-12126", url: "https://www.suse.com/security/cve/CVE-2018-12126", }, { category: "external", summary: "SUSE Bug 1103186 for CVE-2018-12126", url: "https://bugzilla.suse.com/1103186", }, { category: "external", summary: "SUSE Bug 1111331 for CVE-2018-12126", url: "https://bugzilla.suse.com/1111331", }, { category: "external", summary: "SUSE Bug 1132686 for CVE-2018-12126", url: "https://bugzilla.suse.com/1132686", }, { category: "external", summary: "SUSE Bug 1135409 for CVE-2018-12126", url: "https://bugzilla.suse.com/1135409", }, { category: "external", summary: "SUSE Bug 1135524 for CVE-2018-12126", url: "https://bugzilla.suse.com/1135524", }, { category: "external", summary: "SUSE Bug 1137916 for CVE-2018-12126", url: "https://bugzilla.suse.com/1137916", }, { category: "external", summary: "SUSE Bug 1138534 for CVE-2018-12126", url: "https://bugzilla.suse.com/1138534", }, { category: "external", summary: "SUSE Bug 1141977 for CVE-2018-12126", url: "https://bugzilla.suse.com/1141977", }, { category: "external", summary: "SUSE Bug 1149725 for CVE-2018-12126", url: "https://bugzilla.suse.com/1149725", }, { category: "external", summary: "SUSE Bug 1149726 for CVE-2018-12126", url: "https://bugzilla.suse.com/1149726", }, { category: "external", summary: "SUSE Bug 1149729 for CVE-2018-12126", url: "https://bugzilla.suse.com/1149729", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2018-12126", url: "https://bugzilla.suse.com/1178658", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2018-12126", url: "https://bugzilla.suse.com/1201877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.8, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "moderate", }, ], title: "CVE-2018-12126", }, { cve: "CVE-2018-12127", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-12127", }, ], notes: [ { category: "general", text: "Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-12127", url: "https://www.suse.com/security/cve/CVE-2018-12127", }, { category: "external", summary: "SUSE Bug 1103186 for CVE-2018-12127", url: "https://bugzilla.suse.com/1103186", }, { category: "external", summary: "SUSE Bug 1111331 for CVE-2018-12127", url: "https://bugzilla.suse.com/1111331", }, { category: "external", summary: "SUSE Bug 1132686 for CVE-2018-12127", url: "https://bugzilla.suse.com/1132686", }, { category: "external", summary: "SUSE Bug 1135409 for CVE-2018-12127", url: "https://bugzilla.suse.com/1135409", }, { category: "external", summary: "SUSE Bug 1138534 for CVE-2018-12127", url: "https://bugzilla.suse.com/1138534", }, { category: "external", summary: "SUSE Bug 1141977 for CVE-2018-12127", url: "https://bugzilla.suse.com/1141977", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2018-12127", url: "https://bugzilla.suse.com/1178658", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2018-12127", url: "https://bugzilla.suse.com/1201877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.8, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "moderate", }, ], title: "CVE-2018-12127", }, { cve: "CVE-2018-12130", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-12130", }, ], notes: [ { category: "general", text: "Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-12130", url: "https://www.suse.com/security/cve/CVE-2018-12130", }, { category: "external", summary: "SUSE Bug 1103186 for CVE-2018-12130", url: "https://bugzilla.suse.com/1103186", }, { category: "external", summary: "SUSE Bug 1111331 for CVE-2018-12130", url: "https://bugzilla.suse.com/1111331", }, { category: "external", summary: "SUSE Bug 1132686 for CVE-2018-12130", url: "https://bugzilla.suse.com/1132686", }, { category: "external", summary: "SUSE Bug 1135409 for CVE-2018-12130", url: "https://bugzilla.suse.com/1135409", }, { category: "external", summary: "SUSE Bug 1137916 for CVE-2018-12130", url: "https://bugzilla.suse.com/1137916", }, { category: "external", summary: "SUSE Bug 1138534 for CVE-2018-12130", url: "https://bugzilla.suse.com/1138534", }, { category: "external", summary: "SUSE Bug 1141977 for CVE-2018-12130", url: "https://bugzilla.suse.com/1141977", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2018-12130", url: "https://bugzilla.suse.com/1178658", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2018-12130", url: "https://bugzilla.suse.com/1201877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "moderate", }, ], title: "CVE-2018-12130", }, { cve: "CVE-2018-14633", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14633", }, ], notes: [ { category: "general", text: "A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14633", url: "https://www.suse.com/security/cve/CVE-2018-14633", }, { category: "external", summary: "SUSE Bug 1107829 for CVE-2018-14633", url: "https://bugzilla.suse.com/1107829", }, { category: "external", summary: "SUSE Bug 1107832 for CVE-2018-14633", url: "https://bugzilla.suse.com/1107832", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "important", }, ], title: "CVE-2018-14633", }, { cve: "CVE-2018-15572", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-15572", }, ], notes: [ { category: "general", text: "The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the Linux kernel before 4.18.1 does not always fill RSB upon a context switch, which makes it easier for attackers to conduct userspace-userspace spectreRSB attacks.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-15572", url: "https://www.suse.com/security/cve/CVE-2018-15572", }, { category: "external", summary: "SUSE Bug 1102517 for CVE-2018-15572", url: "https://bugzilla.suse.com/1102517", }, { category: "external", summary: "SUSE Bug 1105296 for CVE-2018-15572", url: "https://bugzilla.suse.com/1105296", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "important", }, ], title: "CVE-2018-15572", }, { cve: "CVE-2018-16884", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16884", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16884", url: "https://www.suse.com/security/cve/CVE-2018-16884", }, { category: "external", summary: "SUSE Bug 1119946 for CVE-2018-16884", url: "https://bugzilla.suse.com/1119946", }, { category: "external", summary: "SUSE Bug 1119947 for CVE-2018-16884", url: "https://bugzilla.suse.com/1119947", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "important", }, ], title: "CVE-2018-16884", }, { cve: "CVE-2018-18281", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18281", }, ], notes: [ { category: "general", text: "Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. This is fixed in the following kernel versions: 4.9.135, 4.14.78, 4.18.16, 4.19.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18281", url: "https://www.suse.com/security/cve/CVE-2018-18281", }, { category: "external", summary: "SUSE Bug 1113769 for CVE-2018-18281", url: "https://bugzilla.suse.com/1113769", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "moderate", }, ], title: "CVE-2018-18281", }, { cve: "CVE-2018-18386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18386", }, ], notes: [ { category: "general", text: "drivers/tty/n_tty.c in the Linux kernel before 4.14.11 allows local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18386", url: "https://www.suse.com/security/cve/CVE-2018-18386", }, { category: "external", summary: "SUSE Bug 1094825 for CVE-2018-18386", url: "https://bugzilla.suse.com/1094825", }, { category: "external", summary: "SUSE Bug 1112039 for CVE-2018-18386", url: "https://bugzilla.suse.com/1112039", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "moderate", }, ], title: "CVE-2018-18386", }, { cve: "CVE-2018-18690", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18690", }, ], notes: [ { category: "general", text: "In the Linux kernel before 4.17, a local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandles ATTR_REPLACE operations with conversion of an attr from short to long form.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18690", url: "https://www.suse.com/security/cve/CVE-2018-18690", }, { category: "external", summary: "SUSE Bug 1105025 for CVE-2018-18690", url: "https://bugzilla.suse.com/1105025", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "moderate", }, ], title: "CVE-2018-18690", }, { cve: "CVE-2018-18710", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18710", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18710", url: "https://www.suse.com/security/cve/CVE-2018-18710", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-18710", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "moderate", }, ], title: "CVE-2018-18710", }, { cve: "CVE-2018-19407", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19407", }, ], notes: [ { category: "general", text: "The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19407", url: "https://www.suse.com/security/cve/CVE-2018-19407", }, { category: "external", summary: "SUSE Bug 1116841 for CVE-2018-19407", url: "https://bugzilla.suse.com/1116841", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "moderate", }, ], title: "CVE-2018-19407", }, { cve: "CVE-2018-19824", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19824", }, ], notes: [ { category: "general", text: "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19824", url: "https://www.suse.com/security/cve/CVE-2018-19824", }, { category: "external", summary: "SUSE Bug 1118152 for CVE-2018-19824", url: "https://bugzilla.suse.com/1118152", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "moderate", }, ], title: "CVE-2018-19824", }, { cve: "CVE-2018-19985", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19985", }, ], notes: [ { category: "general", text: "The function hso_get_config_data in drivers/net/usb/hso.c in the Linux kernel through 4.19.8 reads if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allows arbitrary read in the kernel address space.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19985", url: "https://www.suse.com/security/cve/CVE-2018-19985", }, { category: "external", summary: "SUSE Bug 1120743 for CVE-2018-19985", url: "https://bugzilla.suse.com/1120743", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "low", }, ], title: "CVE-2018-19985", }, { cve: "CVE-2018-20169", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20169", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20169", url: "https://www.suse.com/security/cve/CVE-2018-20169", }, { category: "external", summary: "SUSE Bug 1119714 for CVE-2018-20169", url: "https://bugzilla.suse.com/1119714", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "moderate", }, ], title: "CVE-2018-20169", }, { cve: "CVE-2018-5391", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-5391", }, ], notes: [ { category: "general", text: "The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-5391", url: "https://www.suse.com/security/cve/CVE-2018-5391", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-5391", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1102340 for CVE-2018-5391", url: "https://bugzilla.suse.com/1102340", }, { category: "external", summary: "SUSE Bug 1103097 for CVE-2018-5391", url: "https://bugzilla.suse.com/1103097", }, { category: "external", summary: "SUSE Bug 1103098 for CVE-2018-5391", url: "https://bugzilla.suse.com/1103098", }, { category: "external", summary: "SUSE Bug 1108654 for CVE-2018-5391", url: "https://bugzilla.suse.com/1108654", }, { category: "external", summary: "SUSE Bug 1114071 for CVE-2018-5391", url: "https://bugzilla.suse.com/1114071", }, { category: "external", summary: "SUSE Bug 1121102 for CVE-2018-5391", url: "https://bugzilla.suse.com/1121102", }, { category: "external", summary: "SUSE Bug 1134140 for CVE-2018-5391", url: "https://bugzilla.suse.com/1134140", }, { category: "external", summary: "SUSE Bug 1181460 for CVE-2018-5391", url: "https://bugzilla.suse.com/1181460", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "important", }, ], title: "CVE-2018-5391", }, { cve: "CVE-2018-9516", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-9516", }, ], notes: [ { category: "general", text: "In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-71361580.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-9516", url: "https://www.suse.com/security/cve/CVE-2018-9516", }, { category: "external", summary: "SUSE Bug 1108498 for CVE-2018-9516", url: "https://bugzilla.suse.com/1108498", }, { category: "external", summary: "SUSE Bug 1123161 for CVE-2018-9516", url: "https://bugzilla.suse.com/1123161", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "moderate", }, ], title: "CVE-2018-9516", }, { cve: "CVE-2018-9568", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-9568", }, ], notes: [ { category: "general", text: "In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-9568", url: "https://www.suse.com/security/cve/CVE-2018-9568", }, { category: "external", summary: "SUSE Bug 1118319 for CVE-2018-9568", url: "https://bugzilla.suse.com/1118319", }, { category: "external", summary: "SUSE Bug 1118320 for CVE-2018-9568", url: "https://bugzilla.suse.com/1118320", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "important", }, ], title: "CVE-2018-9568", }, { cve: "CVE-2019-11091", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-11091", }, ], notes: [ { category: "general", text: "Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-11091", url: "https://www.suse.com/security/cve/CVE-2019-11091", }, { category: "external", summary: "SUSE Bug 1103186 for CVE-2019-11091", url: "https://bugzilla.suse.com/1103186", }, { category: "external", summary: "SUSE Bug 1111331 for CVE-2019-11091", url: "https://bugzilla.suse.com/1111331", }, { category: "external", summary: "SUSE Bug 1132686 for CVE-2019-11091", url: "https://bugzilla.suse.com/1132686", }, { category: "external", summary: "SUSE Bug 1133319 for CVE-2019-11091", url: "https://bugzilla.suse.com/1133319", }, { category: "external", summary: "SUSE Bug 1135394 for CVE-2019-11091", url: "https://bugzilla.suse.com/1135394", }, { category: "external", summary: "SUSE Bug 1138043 for CVE-2019-11091", url: "https://bugzilla.suse.com/1138043", }, { category: "external", summary: "SUSE Bug 1138534 for CVE-2019-11091", url: "https://bugzilla.suse.com/1138534", }, { category: "external", summary: "SUSE Bug 1141977 for CVE-2019-11091", url: "https://bugzilla.suse.com/1141977", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2019-11091", url: "https://bugzilla.suse.com/1178658", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2019-11091", url: "https://bugzilla.suse.com/1201877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "moderate", }, ], title: "CVE-2019-11091", }, { cve: "CVE-2019-11486", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-11486", }, ], notes: [ { category: "general", text: "The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-11486", url: "https://www.suse.com/security/cve/CVE-2019-11486", }, { category: "external", summary: "SUSE Bug 1133188 for CVE-2019-11486", url: "https://bugzilla.suse.com/1133188", }, { category: "external", summary: "SUSE Bug 1156434 for CVE-2019-11486", url: "https://bugzilla.suse.com/1156434", }, { category: "external", summary: "SUSE Bug 1173667 for CVE-2019-11486", url: "https://bugzilla.suse.com/1173667", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "moderate", }, ], title: "CVE-2019-11486", }, { cve: "CVE-2019-3459", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3459", }, ], notes: [ { category: "general", text: "A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3459", url: "https://www.suse.com/security/cve/CVE-2019-3459", }, { category: "external", summary: "SUSE Bug 1120758 for CVE-2019-3459", url: "https://bugzilla.suse.com/1120758", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.6, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "moderate", }, ], title: "CVE-2019-3459", }, { cve: "CVE-2019-3460", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3460", }, ], notes: [ { category: "general", text: "A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3460", url: "https://www.suse.com/security/cve/CVE-2019-3460", }, { category: "external", summary: "SUSE Bug 1120758 for CVE-2019-3460", url: "https://bugzilla.suse.com/1120758", }, { category: "external", summary: "SUSE Bug 1155131 for CVE-2019-3460", url: "https://bugzilla.suse.com/1155131", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.6, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "moderate", }, ], title: "CVE-2019-3460", }, { cve: "CVE-2019-3882", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3882", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3882", url: "https://www.suse.com/security/cve/CVE-2019-3882", }, { category: "external", summary: "SUSE Bug 1131416 for CVE-2019-3882", url: "https://bugzilla.suse.com/1131416", }, { category: "external", summary: "SUSE Bug 1131427 for CVE-2019-3882", url: "https://bugzilla.suse.com/1131427", }, { category: "external", summary: "SUSE Bug 1133319 for CVE-2019-3882", url: "https://bugzilla.suse.com/1133319", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "moderate", }, ], title: "CVE-2019-3882", }, { cve: "CVE-2019-6974", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-6974", }, ], notes: [ { category: "general", text: "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-6974", url: "https://www.suse.com/security/cve/CVE-2019-6974", }, { category: "external", summary: "SUSE Bug 1124728 for CVE-2019-6974", url: "https://bugzilla.suse.com/1124728", }, { category: "external", summary: "SUSE Bug 1124729 for CVE-2019-6974", url: "https://bugzilla.suse.com/1124729", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "important", }, ], title: "CVE-2019-6974", }, { cve: "CVE-2019-7221", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-7221", }, ], notes: [ { category: "general", text: "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-7221", url: "https://www.suse.com/security/cve/CVE-2019-7221", }, { category: "external", summary: "SUSE Bug 1124732 for CVE-2019-7221", url: "https://bugzilla.suse.com/1124732", }, { category: "external", summary: "SUSE Bug 1124734 for CVE-2019-7221", url: "https://bugzilla.suse.com/1124734", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "important", }, ], title: "CVE-2019-7221", }, { cve: "CVE-2019-7222", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-7222", }, ], notes: [ { category: "general", text: "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-7222", url: "https://www.suse.com/security/cve/CVE-2019-7222", }, { category: "external", summary: "SUSE Bug 1124735 for CVE-2019-7222", url: "https://bugzilla.suse.com/1124735", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.8, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "low", }, ], title: "CVE-2019-7222", }, { cve: "CVE-2019-8564", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-8564", }, ], notes: [ { category: "general", text: "A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-8564", url: "https://www.suse.com/security/cve/CVE-2019-8564", }, { category: "external", summary: "SUSE Bug 1132673 for CVE-2019-8564", url: "https://bugzilla.suse.com/1132673", }, { category: "external", summary: "SUSE Bug 1132828 for CVE-2019-8564", url: "https://bugzilla.suse.com/1132828", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "moderate", }, ], title: "CVE-2019-8564", }, { cve: "CVE-2019-9213", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-9213", }, ], notes: [ { category: "general", text: "In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-9213", url: "https://www.suse.com/security/cve/CVE-2019-9213", }, { category: "external", summary: "SUSE Bug 1128166 for CVE-2019-9213", url: "https://bugzilla.suse.com/1128166", }, { category: "external", summary: "SUSE Bug 1128378 for CVE-2019-9213", url: "https://bugzilla.suse.com/1128378", }, { category: "external", summary: "SUSE Bug 1129016 for CVE-2019-9213", url: "https://bugzilla.suse.com/1129016", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "moderate", }, ], title: "CVE-2019-9213", }, { cve: "CVE-2019-9503", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-9503", }, ], notes: [ { category: "general", text: "The Broadcom brcmfmac WiFi driver prior to commit a4176ec356c73a46c07c181c6d04039fafa34a9f is vulnerable to a frame validation bypass. If the brcmfmac driver receives a firmware event frame from a remote source, the is_wlc_event_frame function will cause this frame to be discarded and unprocessed. If the driver receives the firmware event frame from the host, the appropriate handler is called. This frame validation can be bypassed if the bus used is USB (for instance by a wifi dongle). This can allow firmware event frames from a remote source to be processed. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-9503", url: "https://www.suse.com/security/cve/CVE-2019-9503", }, { category: "external", summary: "SUSE Bug 1132673 for CVE-2019-9503", url: "https://bugzilla.suse.com/1132673", }, { category: "external", summary: "SUSE Bug 1132828 for CVE-2019-9503", url: "https://bugzilla.suse.com/1132828", }, { category: "external", summary: "SUSE Bug 1133319 for CVE-2019-9503", url: "https://bugzilla.suse.com/1133319", }, { category: "external", summary: "SUSE Bug 1156653 for CVE-2019-9503", url: "https://bugzilla.suse.com/1156653", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T11:38:31Z", details: "moderate", }, ], title: "CVE-2019-9503", }, ], }
suse-su-2018:3773-1
Vulnerability from csaf_suse
Published
2018-11-15 16:48
Modified
2018-11-15 16:48
Summary
Security update for the Linux RT Kernel
Notes
Title of the patch
Security update for the Linux RT Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 RT kernel was updated to 4.4.162 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bnc#1107829).
- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).
- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).
- CVE-2018-18690: A local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE operations with conversion of an attr from short to long form (bnc#1105025).
- CVE-2018-18710: An issue was discovered in the Linux kernel An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).
- CVE-2018-9516: A lack of certain checks in the hid_debug_events_read() function in the drivers/hid/hid-debug.c file might have resulted in receiving userspace buffer overflow and an out-of-bounds write or to the infinite loop. (bnc#1108498).
The following non-security bugs were fixed:
- 6lowpan: iphc: reset mac_header after decompress to fix panic (bnc#1012382).
- alsa: bebob: use address returned by kmalloc() instead of kernel stack for streaming DMA mapping (bnc#1012382).
- alsa: emu10k1: fix possible info leak to userspace on SNDRV_EMU10K1_IOCTL_INFO (bnc#1012382).
- alsa: hda: Add AZX_DCAPS_PM_RUNTIME for AMD Raven Ridge (bnc#1012382).
- alsa: hda - Fix cancel_work_sync() stall from jackpoll work (bnc#1012382).
- alsa: hda/realtek - Cannot adjust speaker's volume on Dell XPS 27 7760 (bnc#1012382).
- alsa: msnd: Fix the default sample sizes (bnc#1012382).
- alsa: pcm: Fix snd_interval_refine first/last with open min/max (bnc#1012382).
- alsa: usb-audio: Fix multiple definitions in AU0828_DEVICE() macro (bnc#1012382).
- apparmor: remove no-op permission check in policy_unpack (git-fixes).
- arc: build: Get rid of toolchain check (bnc#1012382).
- arc: clone syscall to setp r25 as thread pointer (bnc#1012382).
- arch/hexagon: fix kernel/dma.c build warning (bnc#1012382).
- arc: [plat-axs*]: Enable SWAP (bnc#1012382).
- arm64: bpf: jit JMP_JSET_{X,K} (bsc#1110613).
- arm64: Correct type for PUD macros (bsc#1110600).
- arm64: cpufeature: Track 32bit EL0 support (bnc#1012382).
- arm64: dts: qcom: db410c: Fix Bluetooth LED trigger (bnc#1012382).
- arm64: fix erroneous __raw_read_system_reg() cases (bsc#1110606).
- arm64: Fix potential race with hardware DBM in ptep_set_access_flags() (bsc#1110605).
- arm64: fpsimd: Avoid FPSIMD context leakage for the init task (bsc#1110603).
- arm64: jump_label.h: use asm_volatile_goto macro instead of 'asm goto' (bnc#1012382).
- arm64: kasan: avoid bad virt_to_pfn() (bsc#1110612).
- arm64: kasan: avoid pfn_to_nid() before page array is initialized (bsc#1110619).
- arm64/kasan: do not allocate extra shadow memory (bsc#1110611).
- arm64: kernel: Update kerneldoc for cpu_suspend() rename (bsc#1110602).
- arm64: kgdb: handle read-only text / modules (bsc#1110604).
- arm64: kvm: Sanitize PSTATE.M when being set from userspace (bnc#1012382).
- arm64: kvm: Tighten guest core register access from userspace (bnc#1012382).
- arm64/mm/kasan: do not use vmemmap_populate() to initialize shadow (bsc#1110618).
- arm64: ptrace: Avoid setting compat FP[SC]R to garbage if get_user fails (bsc#1110601).
- arm64: supported.conf: mark armmmci as not supported
- arm64 Update config files. (bsc#1110468) Set MMC_QCOM_DML to build-in and delete driver from supported.conf
- arm64: vdso: fix clock_getres for 4GiB-aligned res (bsc#1110614).
- arm: dts: at91: add new compatibility string for macb on sama5d3 (bnc#1012382).
- arm: dts: dra7: fix DCAN node addresses (bnc#1012382).
- arm: exynos: Clear global variable on init error path (bnc#1012382).
- arm: hisi: check of_iomap and fix missing of_node_put (bnc#1012382).
- arm: hisi: fix error handling and missing of_node_put (bnc#1012382).
- arm: hisi: handle of_iomap and fix missing of_node_put (bnc#1012382).
- arm: mvebu: declare asm symbols as character arrays in pmsu.c (bnc#1012382).
- ASoC: cs4265: fix MMTLR Data switch control (bnc#1012382).
- ASoC: dapm: Fix potential DAI widget pointer deref when linking DAIs (bnc#1012382).
- ASoC: sigmadsp: safeload should not have lower byte limit (bnc#1012382).
- ASoC: wm8804: Add ACPI support (bnc#1012382).
- ata: libahci: Correct setting of DEVSLP register (bnc#1012382).
- ath10k: disable bundle mgmt tx completion event support (bnc#1012382).
- ath10k: fix scan crash due to incorrect length calculation (bnc#1012382).
- ath10k: fix use-after-free in ath10k_wmi_cmd_send_nowait (bnc#1012382).
- ath10k: prevent active scans on potential unusable channels (bnc#1012382).
- ath10k: protect ath10k_htt_rx_ring_free with rx_ring.lock (bnc#1012382).
- audit: fix use-after-free in audit_add_watch (bnc#1012382).
- autofs: fix autofs_sbi() does not check super block type (bnc#1012382).
- binfmt_elf: Respect error return from `regset->active' (bnc#1012382).
- bluetooth: Add a new Realtek 8723DE ID 0bda:b009 (bnc#1012382).
- bluetooth: h5: Fix missing dependency on BT_HCIUART_SERDEV (bnc#1012382).
- bluetooth: hidp: Fix handling of strncpy for hid->name information (bnc#1012382).
- bnxt_en: Fix TX timeout during netpoll (bnc#1012382).
- bonding: avoid possible dead-lock (bnc#1012382).
- bpf: fix cb access in socket filter programs on tail calls (bsc#1012382).
- bpf: fix map not being uncharged during map creation failure (bsc#1012382).
- bpf, s390: fix potential memleak when later bpf_jit_prog fails (git-fixes).
- bpf, s390x: do not reload skb pointers in non-skb context (git-fixes).
- bsc#1106913: Replace with upstream variants
- btrfs: add a comp_refs() helper (dependency for bsc#1031392).
- btrfs: add missing initialization in btrfs_check_shared (Git-fixes bsc#1112262).
- btrfs: add tracepoints for outstanding extents mods (dependency for bsc#1031392).
- btrfs: add wrapper for counting BTRFS_MAX_EXTENT_SIZE (dependency for bsc#1031392).
- btrfs: cleanup extent locking sequence (dependency for bsc#1031392).
- btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag (Follow up fixes for bsc#1031392).
- btrfs: delayed-inode: Remove wrong qgroup meta reservation calls (bsc#1031392).
- btrfs: delayed-inode: Use new qgroup meta rsv for delayed inode and item (bsc#1031392).
- btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667).
- btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).
- btrfs: fix error handling in btrfs_dev_replace_start (bsc#1107535).
- btrfs: fix invalid attempt to free reserved space on failure to cow range (dependency for bsc#1031392).
- btrfs: fix missing error return in btrfs_drop_snapshot (Git-fixes bsc#1109919).
- btrfs: Fix race condition between delayed refs and blockgroup removal (Git-fixes bsc#1112263).
- btrfs: Fix wrong btrfs_delalloc_release_extents parameter (bsc#1031392).
- btrfs: kill trans in run_delalloc_nocow and btrfs_cross_ref_exist (dependency for bsc#1031392).
- btrfs: make the delalloc block rsv per inode (dependency for bsc#1031392).
- btrfs: pass delayed_refs directly to btrfs_find_delayed_ref_head (dependency for bsc#1031392).
- btrfs: qgroup: Add quick exit for non-fs extents (dependency for bsc#1031392).
- btrfs: qgroup: Cleanup btrfs_qgroup_prepare_account_extents function (dependency for bsc#1031392).
- btrfs: qgroup: Cleanup the remaining old reservation counters (bsc#1031392).
- btrfs: qgroup: Commit transaction in advance to reduce early EDQUOT (bsc#1031392).
- btrfs: qgroup: Do not use root->qgroup_meta_rsv for qgroup (bsc#1031392).
- btrfs: qgroup: Fix wrong qgroup reservation update for relationship modification (bsc#1031392).
- btrfs: qgroup: Introduce function to convert META_PREALLOC into META_PERTRANS (bsc#1031392).
- btrfs: qgroup: Introduce helpers to update and access new qgroup rsv (bsc#1031392).
- btrfs: qgroup: Make qgroup_reserve and its callers to use separate reservation type (bsc#1031392).
- btrfs: qgroup: Skeleton to support separate qgroup reservation type (bsc#1031392).
- btrfs: qgroups: opencode qgroup_free helper (dependency for bsc#1031392).
- btrfs: qgroup: Split meta rsv type into meta_prealloc and meta_pertrans (bsc#1031392).
- btrfs: qgroup: Update trace events for metadata reservation (bsc#1031392).
- btrfs: qgroup: Update trace events to use new separate rsv types (bsc#1031392).
- btrfs: qgroup: Use independent and accurate per inode qgroup rsv (bsc#1031392).
- btrfs: qgroup: Use root::qgroup_meta_rsv_* to record qgroup meta reserved space (bsc#1031392).
- btrfs: qgroup: Use separate meta reservation type for delalloc (bsc#1031392).
- btrfs: remove type argument from comp_tree_refs (dependency for bsc#1031392).
- btrfs: rework outstanding_extents (dependency for bsc#1031392).
- btrfs: switch args for comp_*_refs (dependency for bsc#1031392).
- btrfs: Take trans lock before access running trans in check_delayed_ref (Follow up fixes for bsc#1031392).
- ceph: avoid a use-after-free in ceph_destroy_options() (bsc#1112007).
- cfg80211: fix a type issue in ieee80211_chandef_to_operating_class() (bnc#1012382).
- cfg80211: nl80211_update_ft_ies() to validate NL80211_ATTR_IE (bnc#1012382).
- cfq: Give a chance for arming slice idle timer in case of group_idle (bnc#1012382).
- cgroup: Fix deadlock in cpu hotplug path (bnc#1012382).
- cgroup, netclassid: add a preemption point to write_classid (bnc#1098996).
- cifs: check for STATUS_USER_SESSION_DELETED (bsc#1112902).
- cifs: connect to servername instead of IP for IPC$ share (bsc#1106359).
- cifs: fix memory leak in SMB2_open() (bsc#1112894).
- cifs: Fix use after free of a mid_q_entry (bsc#1112903).
- cifs: fix wrapping bugs in num_entries() (bnc#1012382).
- cifs: integer overflow in in SMB2_ioctl() (bsc#1012382).
- cifs: prevent integer overflow in nxt_dir_entry() (bnc#1012382).
- cifs: read overflow in is_valid_oplock_break() (bnc#1012382).
- clk: imx6ul: fix missing of_node_put() (bnc#1012382).
- clocksource/drivers/ti-32k: Add CLOCK_SOURCE_SUSPEND_NONSTOP flag for non-am43 SoCs (bnc#1012382).
- config.sh: set BUGZILLA_PRODUCT for SLE12-SP3
- coresight: Handle errors in finding input/output ports (bnc#1012382).
- coresight: tpiu: Fix disabling timeouts (bnc#1012382).
- cpu/hotplug: Fix SMT supported evaluation (bsc#1089343).
- crypto: mxs-dcp - Fix wait logic on chan threads (bnc#1012382).
- crypto: sharah - Unregister correct algorithms for SAHARA 3 (bnc#1012382).
- crypto: skcipher - Fix -Wstringop-truncation warnings (bnc#1012382).
- Define dependencies of in-kernel KMPs statically This allows us to use rpm's internal dependency generator (bsc#981083).
- Define early_radix_enabled() (bsc#1094244).
- dmaengine: pl330: fix irq race with terminate_all (bnc#1012382).
- dm cache: fix resize crash if user does not reload cache table (bnc#1012382).
- dm thin metadata: fix __udivdi3 undefined on 32-bit (bnc#1012382).
- dm thin metadata: try to avoid ever aborting transactions (bnc#1012382).
- Do not ship firmware (bsc#1054239). Pull firmware from kernel-firmware instead.
- drivers: net: cpsw: fix parsing of phy-handle DT property in dual_emac config (bnc#1012382).
- drivers: net: cpsw: fix segfault in case of bad phy-handle (bnc#1012382).
- drivers/tty: add error handling for pcmcia_loop_config (bnc#1012382).
- drm/amdgpu: Fix SDMA HQD destroy error on gfx_v7 (bnc#1012382).
- drm/amdkfd: Fix error codes in kfd_get_process (bnc#1012382).
- drm/nouveau/drm/nouveau: Use pm_runtime_get_noresume() in connector_detect() (bnc#1012382).
- drm/nouveau/TBDdevinit: do not fail when PMU/PRE_OS is missing from VBIOS (bnc#1012382).
- drm/nouveau: tegra: Detach from ARM DMA/IOMMU mapping (bnc#1012382).
- drm/virtio: fix bounds check in virtio_gpu_cmd_get_capset() (bsc#1106929)
- Drop dtb-source.spec and move the sources to kernel-source (bsc#1011920)
- e1000: check on netif_running() before calling e1000_up() (bnc#1012382).
- e1000: ensure to free old tx/rx rings in set_ringparam() (bnc#1012382).
- ebtables: arpreply: Add the standard target sanity check (bnc#1012382).
- edac, thunderx: Fix memory leak in thunderx_l2c_threaded_isr() (bsc#1114648).
- ethernet: ti: davinci_emac: add missing of_node_put after calling of_parse_phandle (bnc#1012382).
- ethtool: Remove trailing semicolon for static inline (bnc#1012382).
- ethtool: restore erroneously removed break in dev_ethtool (bsc#1114229).
- ext4: avoid divide by zero fault when deleting corrupted inline directories (bnc#1012382).
- ext4: do not mark mmp buffer head dirty (bnc#1012382).
- ext4: fix online resize's handling of a too-small final block group (bnc#1012382).
- ext4: fix online resizing for bigalloc file systems with a 1k block size (bnc#1012382).
- ext4: recalucate superblock checksum after updating free blocks/inodes (bnc#1012382).
- f2fs: do not set free of current section (bnc#1012382).
- f2fs: fix to do sanity check with {sit,nat}_ver_bitmap_bytesize (bnc#1012382).
- fbdev: Distinguish between interlaced and progressive modes (bnc#1012382).
- fbdev: fix broken menu dependencies (bsc#1106929)
- fbdev/omapfb: fix omapfb_memory_read infoleak (bnc#1012382).
- fbdev/via: fix defined but not used warning (bnc#1012382).
- floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl (bnc#1012382).
- fs/cifs: do not translate SFM_SLASH (U+F026) to backslash (bnc#1012382).
- fs/cifs: suppress a string overflow warning (bnc#1012382).
- fs/eventpoll: loosen irq-safety when possible (bsc#1096052).
- gfs2: Special-case rindex for gfs2_grow (bnc#1012382).
- gpio: adp5588: Fix sleep-in-atomic-context bug (bnc#1012382).
- gpiolib: Mark gpio_suffixes array with __maybe_unused (bnc#1012382).
- gpio: ml-ioh: Fix buffer underwrite on probe error path (bnc#1012382).
- gpio: tegra: Move driver registration to subsys_init level (bnc#1012382).
- gso_segment: Reset skb->mac_len after modifying network header (bnc#1012382).
- hexagon: modify ffs() and fls() to return int (bnc#1012382).
- hid: hid-ntrig: add error handling for sysfs_create_group (bnc#1012382).
- hid: sony: Support DS4 dongle (bnc#1012382).
- hid: sony: Update device ids (bnc#1012382).
- hv: avoid crash in vmbus sysfs files (bnc#1108377).
- hwmon: (adt7475) Make adt7475_read_word() return errors (bnc#1012382).
- hwmon: (ina2xx) fix sysfs shunt resistor read access (bnc#1012382).
- i2c: i2c-scmi: fix for i2c_smbus_write_block_data (bnc#1012382).
- i2c: i801: Allow ACPI AML access I/O ports not reserved for SMBus (bnc#1012382).
- i2c: i801: fix DNV's SMBCTRL register offset (bnc#1012382).
- i2c: uniphier-f: issue STOP only for last message or I2C_M_STOP (bnc#1012382).
- i2c: uniphier: issue STOP only for last message or I2C_M_STOP (bnc#1012382).
- i2c: xiic: Make the start and the byte count write atomic (bnc#1012382).
- i2c: xlp9xx: Add support for SMBAlert (bsc#1103308).
- i2c: xlp9xx: Fix case where SSIF read transaction completes early (bsc#1103308).
- i2c: xlp9xx: Fix issue seen when updating receive length (bsc#1103308).
- i2c: xlp9xx: Make sure the transfer size is not more than I2C_SMBUS_BLOCK_SIZE (bsc#1103308).
- ib/ipoib: Avoid a race condition between start_xmit and cm_rep_handler (bnc#1012382).
- ib/srp: Avoid that sg_reset -d ${srp_device} triggers an infinite loop (bnc#1012382).
- input: atakbd - fix Atari CapsLock behaviour (bnc#1012382).
- input: atakbd - fix Atari keymap (bnc#1012382).
- input: atmel_mxt_ts - only use first T9 instance (bnc#1012382).
- input: elantech - enable middle button of touchpad on ThinkPad P72 (bnc#1012382).
- iommu/amd: Return devid as alias for ACPI HID devices (bsc#1106105).
- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bnc#1012382).
- iommu/ipmmu-vmsa: Fix allocation in atomic context (bnc#1012382).
- ip6_tunnel: be careful when accessing the inner header (bnc#1012382).
- ipmi:ssif: Add support for multi-part transmit messages > 2 parts (bsc#1103308).
- ip_tunnel: be careful when accessing the inner header (bnc#1012382).
- ipv4: fix use-after-free in ip_cmsg_recv_dstaddr() (bnc#1012382).
- ipv6: fix possible use-after-free in ip6_xmit() (bnc#1012382).
- iw_cxgb4: only allow 1 flush on user qps (bnc#1012382).
- ixgbe: pci_set_drvdata must be called before register_netdev (Git-fixes bsc#1109923).
- jffs2: return -ERANGE when xattr buffer is too small (bnc#1012382).
- KABI: move the new handler to end of machdep_calls and hide it from genksyms (bsc#1094244).
- kABI: protect struct hnae_desc_cb (kabi).
- kbuild: add .DELETE_ON_ERROR special target (bnc#1012382).
- kernel-obs-build.spec.in: add --no-hostonly-cmdline to dracut invocation (boo#1062303). call dracut with --no-hostonly-cmdline to avoid the random rootfs UUID being added into the initrd's /etc/cmdline.d/95root-dev.conf
- kernel-obs-build: use pae and lpae kernels where available (bsc#1073579).
- kernel/params.c: downgrade warning for unsafe parameters (bsc#1050549).
- kprobes/x86: Release insn_slot in failure path (bsc#1110006).
- kthread: fix boot hang (regression) on MIPS/OpenRISC (bnc#1012382).
- kthread: Fix use-after-free if kthread fork fails (bnc#1012382).
- kvm: nVMX: Do not expose MPX VMX controls when guest MPX disabled (bsc#1106240).
- kvm: nVMX: Do not flush TLB when vmcs12 uses VPID (bsc#1106240).
- kvm: PPC: Book3S HV: Do not truncate HPTE index in xlate function (bnc#1012382).
- kvm: x86: Do not re-{try,execute} after failed emulation in L2 (bsc#1106240).
- kvm: x86: Do not use kvm_x86_ops->mpx_supported() directly (bsc#1106240).
- kvm: x86: fix APIC page invalidation (bsc#1106240).
- kvm: x86: remove eager_fpu field of struct kvm_vcpu_arch (bnc#1012382).
- kvm/x86: remove WARN_ON() for when vm_munmap() fails (bsc#1106240).
- kvm: x86: SVM: Call x86_spec_ctrl_set_guest/host() with interrupts disabled (bsc#1106240).
- lib/test_hexdump.c: fix failure on big endian cpu (bsc#1106110).
- locking/osq_lock: Fix osq_lock queue corruption (bnc#1012382).
- locking/rwsem-xadd: Fix missed wakeup due to reordering of load (bnc#1012382).
- lpfc: fixup crash in lpfc_els_unsol_buffer() (bsc#1107318).
- mac80211: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bnc#1012382).
- mac80211: fix a race between restart and CSA flows (bnc#1012382).
- mac80211: fix setting IEEE80211_KEY_FLAG_RX_MGMT for AP mode keys (bnc#1012382).
- mac80211: Fix station bandwidth setting after channel switch (bnc#1012382).
- mac80211_hwsim: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bnc#1012382).
- mac80211: mesh: fix HWMP sequence numbering to follow standard (bnc#1012382).
- mac80211: restrict delayed tailroom needed decrement (bnc#1012382).
- mac80211: shorten the IBSS debug messages (bnc#1012382).
- mach64: detect the dot clock divider correctly on sparc (bnc#1012382).
- macintosh/via-pmu: Add missing mmio accessors (bnc#1012382).
- macros.kernel-source: define linux_arch for KMPs (boo#1098050). CONFIG_64BIT is no longer defined so KMP spec files need to include %{?linux_make_arch} in any make call to build modules or descent into the kernel directory for any reason.
- macros.kernel-source: pass -b properly in kernel module package (bsc#1107870).
- macros.kernel-source: pass -f properly in module subpackage (boo#1076393).
- md-cluster: clear another node's suspend_area after the copy is finished (bnc#1012382).
- md/raid1: exit sync request if MD_RECOVERY_INTR is set (git-fixes).
- md/raid5: fix data corruption of replacements after originals dropped (bnc#1012382).
- media: af9035: prevent buffer overflow on write (bnc#1012382).
- media: exynos4-is: Prevent NULL pointer dereference in __isp_video_try_fmt() (bnc#1012382).
- media: fsl-viu: fix error handling in viu_of_probe() (bnc#1012382).
- media: omap3isp: zero-initialize the isp cam_xclk{a,b} initial data (bnc#1012382).
- media: omap_vout: Fix a possible null pointer dereference in omap_vout_open() (bsc#1050431).
- media: s3c-camif: ignore -ENOIOCTLCMD from v4l2_subdev_call for s_power (bnc#1012382).
- media: soc_camera: ov772x: correct setting of banding filter (bnc#1012382).
- media: tm6000: add error handling for dvb_register_adapter (bnc#1012382).
- media: uvcvideo: Support realtek's UVC 1.5 device (bnc#1012382).
- media: v4l: event: Prevent freeing event subscriptions while accessed (bnc#1012382).
- media: videobuf2-core: check for q->error in vb2_core_qbuf() (bnc#1012382).
- media: videobuf-dma-sg: Fix dma_{sync,unmap}_sg() calls (bsc#1050431).
- mei: bus: type promotion bug in mei_nfc_if_version() (bnc#1012382).
- memory_hotplug: cond_resched in __remove_pages (bnc#1114178).
- mfd: omap-usb-host: Fix dts probe of children (bnc#1012382).
- mfd: ti_am335x_tscadc: Fix struct clk memory leak (bnc#1012382).
- misc: hmc6352: fix potential Spectre v1 (bnc#1012382).
- misc: mic: SCIF Fix scif_get_new_port() error handling (bnc#1012382).
- misc: ti-st: Fix memory leak in the error path of probe() (bnc#1012382).
- mmc: mmci: stop building qcom dml as module (bsc#1110468).
- mm: fix devmem_is_allowed() for sub-page System RAM intersections (bsc#1110006).
- mm: get rid of vmacache_flush_all() entirely (bnc#1012382).
- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (bnc#1012382).
- mm: /proc/pid/pagemap: hide swap entries from unprivileged users (Git-fixes bsc#1109907).
- mm: shmem.c: Correctly annotate new inodes for lockdep (bnc#1012382).
- mm/vmstat.c: fix outdated vmstat_text (bnc#1012382).
- mm/vmstat.c: skip NR_TLB_REMOTE_FLUSH* properly (bnc#1012382).
- mm/vmstat.c: skip NR_TLB_REMOTE_FLUSH* properly (git fixes).
- module: exclude SHN_UNDEF symbols from kallsyms api (bnc#1012382).
- mtdchar: fix overflows in adjustment of `count` (bnc#1012382).
- mtd/maps: fix solutionengine.c printk format warnings (bnc#1012382).
- neighbour: confirm neigh entries when ARP packet is received (bnc#1012382).
- net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT (bnc#1012382).
- net: cadence: Fix a sleep-in-atomic-context bug in macb_halt_tx() (bnc#1012382).
- net: dcb: For wild-card lookups, use priority -1, not 0 (bnc#1012382).
- net: ethernet: mvneta: Fix napi structure mixup on armada 3700 (bsc#1110616).
- net: ethernet: ti: cpsw: fix mdio device reference leak (bnc#1012382).
- netfilter: x_tables: avoid stack-out-of-bounds read in xt_copy_counters_from_user (bnc#1012382).
- net: hns: fix length and page_offset overflow when CONFIG_ARM64_64K_PAGES (bnc#1012382).
- net: hp100: fix always-true check for link up state (bnc#1012382).
- net: ipv4: update fnhe_pmtu when first hop's MTU changes (bnc#1012382).
- net/ipv6: Display all addresses in output of /proc/net/if_inet6 (bnc#1012382).
- netlabel: check for IPV4MASK in addrinfo_get (bnc#1012382).
- net: macb: disable scatter-gather for macb on sama5d3 (bnc#1012382).
- net/mlx4: Use cpumask_available for eq->affinity_mask (bnc#1012382).
- net: mvneta: fix mtu change on port without link (bnc#1012382).
- net: mvneta: fix mvneta_config_rss on armada 3700 (bsc#1110615).
- net: mvpp2: Extract the correct ethtype from the skb for tx csum offload (bnc#1012382).
- net: systemport: Fix wake-up interrupt race during resume (bnc#1012382).
- net/usb: cancel pending work when unbinding smsc75xx (bnc#1012382).
- nfc: Fix possible memory corruption when handling SHDLC I-Frame commands (bnc#1012382).
- nfc: Fix the number of pipes (bnc#1012382).
- nfs: add nostatflush mount option (bsc#1065726).
- nfs: Avoid quadratic search when freeing delegations (bsc#1084760).
- nfsd: fix corrupted reply to badly ordered compound (bnc#1012382).
- nfs: Use an appropriate work queue for direct-write completion (bsc#1082519).
- nfsv4.0 fix client reference leak in callback (bnc#1012382).
- ocfs2: fix locking for res->tracking and dlm->tracking_list (bnc#1012382).
- ocfs2: fix ocfs2 read block panic (bnc#1012382).
- of: unittest: Disable interrupt node tests for old world MAC systems (bnc#1012382).
- ovl: Copy inode attributes after setting xattr (bsc#1107299).
- parport: sunbpp: fix error return code (bnc#1012382).
- partitions/aix: append null character to print data from disk (bnc#1012382).
- partitions/aix: fix usage of uninitialized lv_info and lvname structures (bnc#1012382).
- Pass x86 as architecture on x86_64 and i386 (bsc#1093118).
- pci: altera: Fix bool initialization in tlp_read_packet() (bsc#1109806).
- pci: designware: Fix I/O space page leak (bsc#1109806).
- pci: designware: Fix pci_remap_iospace() failure path (bsc#1109806).
- pci: hv: Use effective affinity mask (bsc#1109772).
- pci: OF: Fix I/O space page leak (bsc#1109806).
- pci: pciehp: Fix unprotected list iteration in IRQ handler (bsc#1109806).
- pci: Reprogram bridge prefetch registers on resume (bnc#1012382).
- pci: shpchp: Fix AMD POGO identification (bsc#1109806).
- pci: Supply CPU physical address (not bus address) to iomem_is_exclusive() (bsc#1109806).
- pci: versatile: Fix I/O space page leak (bsc#1109806).
- pci: versatile: Fix pci_remap_iospace() failure path (bsc#1109806).
- pci: xgene: Fix I/O space page leak (bsc#1109806).
- pci: xilinx: Add missing of_node_put() (bsc#1109806).
- perf powerpc: Fix callchain ip filtering (bnc#1012382).
- perf powerpc: Fix callchain ip filtering when return address is in a register (bnc#1012382).
- perf probe powerpc: Ignore SyS symbols irrespective of endianness (bnc#1012382).
- perf script python: Fix export-to-postgresql.py occasional failure (bnc#1012382).
- perf tools: Allow overriding MAX_NR_CPUS at compile time (bnc#1012382).
- phy: qcom-ufs: add MODULE_LICENSE tag (bsc#1110468).
- pinctrl: qcom: spmi-gpio: Fix pmic_gpio_config_get() to be compliant (bnc#1012382).
- pipe: actually allow root to exceed the pipe buffer limit (git-fixes).
- platform/x86: alienware-wmi: Correct a memory leak (bnc#1012382).
- platform/x86: toshiba_acpi: Fix defined but not used build warnings (bnc#1012382).
- pm / core: Clear the direct_complete flag on errors (bnc#1012382).
- powerpc/64s: move machine check SLB flushing to mm/slb.c (bsc#1094244).
- powerpc/kdump: Handle crashkernel memory reservation failure (bnc#1012382).
- powerpc/mce: Fix SLB rebolting during MCE recovery path (bsc#1094244).
- powerpc/numa: Skip onlining a offline node in kdump path (bsc#1109784).
- powerpc/numa: Use associativity if VPHN hcall is successful (bsc#1110363).
- powerpc/perf/hv-24x7: Fix passing of catalog version number (bsc#1053043).
- powerpc/powernv: opal_put_chars partial write fix (bnc#1012382).
- powerpc/pseries: Defer the logging of rtas error to irq work queue (bsc#1094244).
- powerpc/pseries: Define MCE error event section (bsc#1094244).
- powerpc/pseries: Display machine check error details (bsc#1094244).
- powerpc/pseries: Dump the SLB contents on SLB MCE errors (bsc#1094244).
- powerpc/pseries: Fix build break for SPLPAR=n and CPU hotplug (bsc#1079524, git-fixes).
- powerpc/pseries: Fix CONFIG_NUMA=n build (bsc#1067906, git-fixes).
- powerpc/pseries: Flush SLB contents on SLB MCE errors (bsc#1094244).
- powerpc/pseries/mm: call H_BLOCK_REMOVE (bsc#1109158).
- powerpc/pseries/mm: factorize PTE slot computation (bsc#1109158).
- powerpc/pseries/mm: Introducing FW_FEATURE_BLOCK_REMOVE (bsc#1109158).
- powerpc/rtas: Fix a potential race between CPU-Offline & Migration (bsc#1111870).
- powerpc/tm: Avoid possible userspace r1 corruption on reclaim (bsc#1109333).
- power: vexpress: fix corruption in notifier registration (bnc#1012382).
- printk: do not spin in printk when in nmi (bsc#1094244).
- proc: restrict kernel stack dumps to root (bnc#1012382).
- pstore: Fix incorrect persistent ram buffer mapping (bnc#1012382).
- qlcnic: fix Tx descriptor corruption on 82xx devices (bnc#1012382).
- r8169: Clear RTL_FLAG_TASK_*_PENDING when clearing RTL_FLAG_TASK_ENABLED (bnc#1012382).
- raid10 BUG_ON in raise_barrier when force is true and conf->barrier is 0 (bnc#1012382).
- rculist: add list_for_each_entry_from_rcu() (bsc#1084760).
- rculist: Improve documentation for list_for_each_entry_from_rcu() (bsc#1084760).
- rdma/cma: Do not ignore net namespace for unbound cm_id (bnc#1012382).
- rdma/cma: Protect cma dev list with lock (bnc#1012382).
- rdma/ucma: check fd type in ucma_migrate_id() (bnc#1012382).
- reiserfs: add check to detect corrupted directory entry (bsc#1109818).
- reiserfs: do not panic on bad directory entries (bsc#1109818).
- resource: Include resource end in walk_*() interfaces (bsc#1114648).
- Revert 'btrfs: qgroups: Retry after commit on getting EDQUOT' (bsc#1031392).
- Revert 'dma-buf/sync-file: Avoid enable fence signaling if poll(.timeout=0)' (bsc#1111363).
- Revert 'drm: Do not pass negative delta to ktime_sub_ns()' (bsc#1106929)
- Revert 'drm/i915: Initialize HWS page address after GPU reset' (bsc#1106929)
- Revert 'Drop kernel trampoline stack.' This reverts commit 85dead31706c1c1755adff90405ff9861c39c704.
- Revert 'kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)' This reverts commit edde1f21880e3bfe244c6f98a3733b05b13533dc.
- Revert 'kvm: x86: remove eager_fpu field of struct kvm_vcpu_arch' (kabi).
- Revert 'media: v4l: event: Prevent freeing event subscriptions while accessed' (kabi).
- Revert 'mm: get rid of vmacache_flush_all() entirely' (kabi).
- Revert 'NFC: Fix the number of pipes' (kabi).
- Revert 'proc: restrict kernel stack dumps to root' (kabi).
- Revert 'Skip intel_crt_init for Dell XPS 8700' (bsc#1106929)
- Revert 'tcp: add tcp_ooo_try_coalesce() helper' (kabi).
- Revert 'tcp: call tcp_drop() from tcp_data_queue_ofo()' (kabi).
- Revert 'tcp: fix a stale ooo_last_skb after a replace' (kabi).
- Revert 'tcp: free batches of packets in tcp_prune_ofo_queue()' (kabi).
- Revert 'tcp: use an RB tree for ooo receive queue' (kabi).
- Revert 'usb: cdc-wdm: Fix a sleep-in-atomic-context bug in service_outstanding_interrupt()' (bnc#1012382).
- Revert 'x86/fpu: Finish excising 'eagerfpu'' (kabi).
- Revert 'x86/fpu: Remove struct fpu::counter' (kabi).
- Revert 'x86/fpu: Remove use_eager_fpu()' (kabi).
- ring-buffer: Allow for rescheduling when removing pages (bnc#1012382).
- rndis_wlan: potential buffer overflow in rndis_wlan_auth_indication() (bnc#1012382).
- rpm/kernel-binary.spec.in: Check module licenses (bsc#1083215,bsc#1083527)
- rpm/kernel-binary.spec.in: Do not sign modules if CONFIG_MODULE_SIG=n (bsc#1035053)
- rpm/kernel-binary.spec.in: Obsolete ftsteutates KMP (boo#997172)
- rpm/kernel-binary.spec.in: Only kernel-syzkaller needs gcc-devel (boo#1043591).
- rpm/kernel-docs.spec.in: Expand kernel tree directly from sources (bsc#1057199)
- rpm/kernel-docs.spec.in: Fix and cleanup for 4.13 doc build (bsc#1048129) The whole DocBook stuff has been deleted. The PDF build still non-working thus the sub-packaging disabled so far.
- rpm/kernel-docs.spec.in: refresh dependencies for PDF build (bsc#1048129) But it still does not work with Tex Live 2017, thus disabled yet. Also add texlive-anyfontsize for HTML math handling.
- rpm/kernel-module-subpackage: Generate proper supplements in the template ... instead of relying on find-provides.ksyms to do it (bsc#981083).
- rpm/kernel-source.spec.in: Do not list deleted depdendency helpers (bsc#981083).
- rpm/kernel-spec-macros: Try harder to detect Build Service environment (bsc#1078788)
- rtc: bq4802: add error handling for devm_ioremap (bnc#1012382).
- rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096 (bnc#1012382).
- s390/chsc: Add exception handler for CHSC instruction (git-fixes).
- s390/extmem: fix gcc 8 stringop-overflow warning (bnc#1012382).
- s390/facilites: use stfle_fac_list array size for MAX_FACILITY_BIT (bnc#1108315, LTC#171326).
- s390/kdump: Fix elfcorehdr size calculation (git-fixes).
- s390/kdump: Make elfcorehdr size calculation ABI compliant (git-fixes).
- s390/mm: correct allocate_pgste proc_handler callback (git-fixes).
- s390/qeth: do not dump past end of unknown HW header (bnc#1012382).
- s390/qeth: fix race in used-buffer accounting (bnc#1012382).
- s390/qeth: handle failure on workqueue creation (git-fixes).
- s390/qeth: reset layer2 attribute on layer switch (bnc#1012382).
- s390/qeth: use vzalloc for QUERY OAT buffer (bnc#1108315, LTC#171527).
- s390: revert ELF_ET_DYN_BASE base changes (git-fixes).
- s390/stacktrace: fix address ranges for asynchronous and panic stack (git-fixes).
- sched/fair: Fix bandwidth timer clock drift condition (Git-fixes).
- sched/fair: Fix vruntime_normalized() for remote non-migration wakeup (Git-fixes).
- scsi: 3ware: fix return 0 on the error path of probe (bnc#1012382).
- scsi: bnx2i: add error handling for ioremap_nocache (bnc#1012382).
- scsi: ibmvscsi: Improve strings handling (bnc#1012382).
- scsi: klist: Make it safe to use klists in atomic context (bnc#1012382).
- scsi: target: fix __transport_register_session locking (bnc#1012382).
- scsi: target/iscsi: Make iscsit_ta_authentication() respect the output buffer size (bnc#1012382).
- selftests/efivarfs: add required kernel configs (bnc#1012382).
- selftest: timers: Tweak raw_skew to SKIP when ADJ_OFFSET/other clock adjustments are in progress (bnc#1012382).
- selinux: use GFP_NOWAIT in the AVC kmem_caches (bnc#1012382).
- serial: cpm_uart: return immediately from console poll (bnc#1012382).
- serial: imx: restore handshaking irq for imx1 (bnc#1012382).
- signal: Properly deliver SIGSEGV from x86 uprobes (bsc#1110006).
- slub: make ->cpu_partial unsigned int (bnc#1012382).
- smb2: fix missing files in root share directory listing (bnc#1012382).
- smb3: fill in statfs fsid and correct namelen (bsc#1112905).
- sound: enable interrupt after dma buffer initialization (bnc#1012382).
- spi: rspi: Fix interrupted DMA transfers (bnc#1012382).
- spi: rspi: Fix invalid SPI use during system suspend (bnc#1012382).
- spi: sh-msiof: Fix handling of write value for SISTR register (bnc#1012382).
- spi: sh-msiof: Fix invalid SPI use during system suspend (bnc#1012382).
- spi: tegra20-slink: explicitly enable/disable clock (bnc#1012382).
- srcu: Allow use of Tiny/Tree SRCU from both process and interrupt context (bsc#1050549).
- staging: android: ashmem: Fix mmap size validation (bnc#1012382).
- staging: rt5208: Fix a sleep-in-atomic bug in xd_copy_page (bnc#1012382).
- staging: rts5208: fix missing error check on call to rtsx_write_register (bnc#1012382).
- staging/rts5208: Fix read overflow in memcpy (bnc#1012382).
- stmmac: fix valid numbers of unicast filter entries (bnc#1012382).
- stop_machine: Atomically queue and wake stopper threads (git-fixes).
- target: log Data-Out timeouts as errors (bsc#1095805).
- target: log NOP ping timeouts as errors (bsc#1095805).
- target: split out helper for cxn timeout error stashing (bsc#1095805).
- target: stash sess_err_stats on Data-Out timeout (bsc#1095805).
- target: use ISCSI_IQN_LEN in iscsi_target_stat (bsc#1095805).
- tcp: add tcp_ooo_try_coalesce() helper (bnc#1012382).
- tcp: call tcp_drop() from tcp_data_queue_ofo() (bnc#1012382).
- tcp: fix a stale ooo_last_skb after a replace (bnc#1012382).
- tcp: free batches of packets in tcp_prune_ofo_queue() (bnc#1012382).
- tcp: increment sk_drops for dropped rx packets (bnc#1012382).
- tcp: use an RB tree for ooo receive queue (bnc#1012382).
- team: Forbid enslaving team device to itself (bnc#1012382).
- thermal: of-thermal: disable passive polling when thermal zone is disabled (bnc#1012382).
- Tools: hv: Fix a bug in the key delete code (bnc#1012382).
- tools/vm/page-types.c: fix 'defined but not used' warning (bnc#1012382).
- tools/vm/slabinfo.c: fix sign-compare warning (bnc#1012382).
- tpm: Restore functionality to xen vtpm driver (bsc#1020645, git-fixes).
- tsl2550: fix lux1_input error in low light (bnc#1012382).
- tty: Drop tty->count on tty_reopen() failure (bnc#1105428).
- tty: rocket: Fix possible buffer overwrite on register_PCI (bnc#1012382).
- tty: vt_ioctl: fix potential Spectre v1 (bnc#1012382).
- ubifs: Check for name being NULL while mounting (bnc#1012382).
- ucma: fix a use-after-free in ucma_resolve_ip() (bnc#1012382).
- uio: potential double frees if __uio_register_device() fails (bnc#1012382).
- usb: add quirk for WORLDE Controller KS49 or Prodipe MIDI 49C USB controller (bnc#1012382).
- usb: Add quirk to support DJI CineSSD (bnc#1012382).
- usb: Avoid use-after-free by flushing endpoints early in usb_set_interface() (bnc#1012382).
- usb: cdc-wdm: Fix a sleep-in-atomic-context bug in service_outstanding_interrupt() (bnc#1012382).
- usb: Do not die twice if PCI xhci host is not responding in resume (bnc#1012382).
- usb: fix error handling in usb_driver_claim_interface() (bnc#1012382).
- usb: gadget: fotg210-udc: Fix memory leak of fotg210->ep[i] (bnc#1012382).
- usb: gadget: serial: fix oops when data rx'd after close (bnc#1012382).
- usb: handle NULL config in usb_find_alt_setting() (bnc#1012382).
- usb: host: u132-hcd: Fix a sleep-in-atomic-context bug in u132_get_frame() (bnc#1012382).
- usb: misc: uss720: Fix two sleep-in-atomic-context bugs (bnc#1012382).
- usb: net2280: Fix erroneous synchronization change (bnc#1012382).
- usb: remove LPM management from usb_driver_claim_interface() (bnc#1012382).
- usb: serial: io_ti: fix array underflow in completion handler (bnc#1012382).
- usb: serial: kobil_sct: fix modem-status error handling (bnc#1012382).
- usb: serial: simple: add Motorola Tetra MTP6550 id (bnc#1012382).
- usb: serial: ti_usb_3410_5052: fix array underflow in completion handler (bnc#1012382).
- usb: usbdevfs: restore warning for nonsensical flags (bnc#1012382).
- usb: usbdevfs: sanitize flags more (bnc#1012382).
- usb: wusbcore: security: cast sizeof to int for comparison (bnc#1012382).
- usb: yurex: Check for truncation in yurex_read() (bnc#1012382).
- usb: yurex: Fix buffer over-read in yurex_write() (bnc#1012382).
- Use upstream version of pci-hyperv change 35a88a18d7
- uwb: hwa-rc: fix memory leak at probe (bnc#1012382).
- vfs: do not test owner for NFS in set_posix_acl() (bsc#1103405).
- video: goldfishfb: fix memory leak on driver remove (bnc#1012382).
- vmci: type promotion bug in qp_host_get_user_memory() (bnc#1012382).
- vmw_balloon: include asm/io.h (bnc#1012382).
- watchdog: w83627hf: Added NCT6102D support (bsc#1106434).
- wlcore: Add missing PM call for wlcore_cmd_wait_for_event_or_timeout() (bnc#1012382).
- wlcore: Fix memory leak in wlcore_cmd_wait_for_event_or_timeout (git-fixes).
- x86/apic: Fix restoring boot IRQ mode in reboot and kexec/kdump (bsc#1110006).
- x86/apic: Split disable_IO_APIC() into two functions to fix CONFIG_KEXEC_JUMP=y (bsc#1110006).
- x86/apic: Split out restore_boot_irq_mode() from disable_IO_APIC() (bsc#1110006).
- x86/boot: Fix 'run_size' calculation (bsc#1110006).
- x86/cpufeature: deduplicate X86_FEATURE_L1TF_PTEINV (kabi).
- x86/entry/64: Add two more instruction suffixes (bnc#1012382).
- x86/entry/64: Clear registers for exceptions/interrupts, to reduce speculation attack surface (bsc#1105931).
- x86/entry/64: sanitize extra registers on syscall entry (bsc#1105931).
- x86/fpu: Finish excising 'eagerfpu' (bnc#1012382).
- x86/fpu: Remove second definition of fpu in __fpu__restore_sig() (bsc#1110006).
- x86/fpu: Remove struct fpu::counter (bnc#1012382).
- x86/fpu: Remove use_eager_fpu() (bnc#1012382).
- x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772).
- x86/kaiser: Avoid loosing NMIs when using trampoline stack (bsc#1106293 bsc#1099597).
- x86/mm: Remove in_nmi() warning from vmalloc_fault() (bnc#1012382).
- x86: msr-index.h: Correct SNB_C1/C3_AUTO_UNDEMOTE defines (bsc#1110006).
- x86/numa_emulation: Fix emulated-to-physical node mapping (bnc#1012382).
- x86/paravirt: Fix some warning messages (bnc#1065600).
- x86/percpu: Fix this_cpu_read() (bsc#1110006).
- x86,sched: Allow topologies where NUMA nodes share an LLC (bsc#1091158, bsc#1101555).
- x86/spec_ctrl: Fix spec_ctrl reporting (bsc#1106913, bsc#1111516).
- x86/speculation: Apply IBPB more strictly to avoid cross-process data leak (bsc#1106913).
- x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation (bsc#1106913).
- x86/speculation: Propagate information about RSB filling mitigation to sysfs (bsc#1106913).
- x86/time: Correct the attribute on jiffies' definition (bsc#1110006).
- x86/tsc: Add missing header to tsc_msr.c (bnc#1012382).
- x86/vdso: Fix asm constraints on vDSO syscall fallbacks (bsc#1110006).
- x86/vdso: Fix vDSO build if a retpoline is emitted (bsc#1110006).
- x86/vdso: Fix vDSO syscall fallback asm constraint regression (bsc#1110006).
- x86/vdso: Only enable vDSO retpolines when enabled and supported (bsc#1110006).
- xen: avoid crash in disable_hotplug_cpu (bnc#1012382 bsc#1106594 bsc#1042422).
- xen: fix GCC warning and remove duplicate EVTCHN_ROW/EVTCHN_COL usage (bnc#1012382).
- xen: issue warning message when out of grant maptrack entries (bsc#1105795).
- xen/manage: do not complain about an empty value in control/sysrq node (bnc#1012382).
- xen/netfront: do not bug in case of too many frags (bnc#1012382).
- xen-netfront: fix queue name setting (bnc#1012382).
- xen/netfront: fix waiting for xenbus state change (bnc#1012382).
- xen-netfront: fix warn message as irq device name has '/' (bnc#1012382).
- xen/x86/vpmu: Zero struct pt_regs before calling into sample handling code (bnc#1012382).
- xfrm: fix 'passing zero to ERR_PTR()' warning (bnc#1012382).
- xhci: Add missing CAS workaround for Intel Sunrise Point xHCI (bnc#1012382).
- xhci: Do not print a warning when setting link state for disabled ports (bnc#1012382).
- x86/kexec: Correct KEXEC_BACKUP_SRC_END off-by-one error (bsc#1114648).
Patchnames
SUSE-SLE-RT-12-SP3-2018-2684
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux RT Kernel", title: "Title of the patch", }, { category: "description", text: "\n\nThe SUSE Linux Enterprise 12 SP3 RT kernel was updated to 4.4.162 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bnc#1107829).\n- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).\n- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).\n- CVE-2018-18690: A local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE operations with conversion of an attr from short to long form (bnc#1105025).\n- CVE-2018-18710: An issue was discovered in the Linux kernel An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).\n- CVE-2018-9516: A lack of certain checks in the hid_debug_events_read() function in the drivers/hid/hid-debug.c file might have resulted in receiving userspace buffer overflow and an out-of-bounds write or to the infinite loop. (bnc#1108498).\n\nThe following non-security bugs were fixed:\n\n- 6lowpan: iphc: reset mac_header after decompress to fix panic (bnc#1012382).\n- alsa: bebob: use address returned by kmalloc() instead of kernel stack for streaming DMA mapping (bnc#1012382).\n- alsa: emu10k1: fix possible info leak to userspace on SNDRV_EMU10K1_IOCTL_INFO (bnc#1012382).\n- alsa: hda: Add AZX_DCAPS_PM_RUNTIME for AMD Raven Ridge (bnc#1012382).\n- alsa: hda - Fix cancel_work_sync() stall from jackpoll work (bnc#1012382).\n- alsa: hda/realtek - Cannot adjust speaker's volume on Dell XPS 27 7760 (bnc#1012382).\n- alsa: msnd: Fix the default sample sizes (bnc#1012382).\n- alsa: pcm: Fix snd_interval_refine first/last with open min/max (bnc#1012382).\n- alsa: usb-audio: Fix multiple definitions in AU0828_DEVICE() macro (bnc#1012382).\n- apparmor: remove no-op permission check in policy_unpack (git-fixes).\n- arc: build: Get rid of toolchain check (bnc#1012382).\n- arc: clone syscall to setp r25 as thread pointer (bnc#1012382).\n- arch/hexagon: fix kernel/dma.c build warning (bnc#1012382).\n- arc: [plat-axs*]: Enable SWAP (bnc#1012382).\n- arm64: bpf: jit JMP_JSET_{X,K} (bsc#1110613).\n- arm64: Correct type for PUD macros (bsc#1110600).\n- arm64: cpufeature: Track 32bit EL0 support (bnc#1012382).\n- arm64: dts: qcom: db410c: Fix Bluetooth LED trigger (bnc#1012382).\n- arm64: fix erroneous __raw_read_system_reg() cases (bsc#1110606).\n- arm64: Fix potential race with hardware DBM in ptep_set_access_flags() (bsc#1110605).\n- arm64: fpsimd: Avoid FPSIMD context leakage for the init task (bsc#1110603).\n- arm64: jump_label.h: use asm_volatile_goto macro instead of 'asm goto' (bnc#1012382).\n- arm64: kasan: avoid bad virt_to_pfn() (bsc#1110612).\n- arm64: kasan: avoid pfn_to_nid() before page array is initialized (bsc#1110619).\n- arm64/kasan: do not allocate extra shadow memory (bsc#1110611).\n- arm64: kernel: Update kerneldoc for cpu_suspend() rename (bsc#1110602).\n- arm64: kgdb: handle read-only text / modules (bsc#1110604).\n- arm64: kvm: Sanitize PSTATE.M when being set from userspace (bnc#1012382).\n- arm64: kvm: Tighten guest core register access from userspace (bnc#1012382).\n- arm64/mm/kasan: do not use vmemmap_populate() to initialize shadow (bsc#1110618).\n- arm64: ptrace: Avoid setting compat FP[SC]R to garbage if get_user fails (bsc#1110601).\n- arm64: supported.conf: mark armmmci as not supported\n- arm64 Update config files. (bsc#1110468) Set MMC_QCOM_DML to build-in and delete driver from supported.conf\n- arm64: vdso: fix clock_getres for 4GiB-aligned res (bsc#1110614).\n- arm: dts: at91: add new compatibility string for macb on sama5d3 (bnc#1012382).\n- arm: dts: dra7: fix DCAN node addresses (bnc#1012382).\n- arm: exynos: Clear global variable on init error path (bnc#1012382).\n- arm: hisi: check of_iomap and fix missing of_node_put (bnc#1012382).\n- arm: hisi: fix error handling and missing of_node_put (bnc#1012382).\n- arm: hisi: handle of_iomap and fix missing of_node_put (bnc#1012382).\n- arm: mvebu: declare asm symbols as character arrays in pmsu.c (bnc#1012382).\n- ASoC: cs4265: fix MMTLR Data switch control (bnc#1012382).\n- ASoC: dapm: Fix potential DAI widget pointer deref when linking DAIs (bnc#1012382).\n- ASoC: sigmadsp: safeload should not have lower byte limit (bnc#1012382).\n- ASoC: wm8804: Add ACPI support (bnc#1012382).\n- ata: libahci: Correct setting of DEVSLP register (bnc#1012382).\n- ath10k: disable bundle mgmt tx completion event support (bnc#1012382).\n- ath10k: fix scan crash due to incorrect length calculation (bnc#1012382).\n- ath10k: fix use-after-free in ath10k_wmi_cmd_send_nowait (bnc#1012382).\n- ath10k: prevent active scans on potential unusable channels (bnc#1012382).\n- ath10k: protect ath10k_htt_rx_ring_free with rx_ring.lock (bnc#1012382).\n- audit: fix use-after-free in audit_add_watch (bnc#1012382).\n- autofs: fix autofs_sbi() does not check super block type (bnc#1012382).\n- binfmt_elf: Respect error return from `regset->active' (bnc#1012382).\n- bluetooth: Add a new Realtek 8723DE ID 0bda:b009 (bnc#1012382).\n- bluetooth: h5: Fix missing dependency on BT_HCIUART_SERDEV (bnc#1012382).\n- bluetooth: hidp: Fix handling of strncpy for hid->name information (bnc#1012382).\n- bnxt_en: Fix TX timeout during netpoll (bnc#1012382).\n- bonding: avoid possible dead-lock (bnc#1012382).\n- bpf: fix cb access in socket filter programs on tail calls (bsc#1012382).\n- bpf: fix map not being uncharged during map creation failure (bsc#1012382).\n- bpf, s390: fix potential memleak when later bpf_jit_prog fails (git-fixes).\n- bpf, s390x: do not reload skb pointers in non-skb context (git-fixes).\n- bsc#1106913: Replace with upstream variants\n- btrfs: add a comp_refs() helper (dependency for bsc#1031392).\n- btrfs: add missing initialization in btrfs_check_shared (Git-fixes bsc#1112262).\n- btrfs: add tracepoints for outstanding extents mods (dependency for bsc#1031392).\n- btrfs: add wrapper for counting BTRFS_MAX_EXTENT_SIZE (dependency for bsc#1031392).\n- btrfs: cleanup extent locking sequence (dependency for bsc#1031392).\n- btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag (Follow up fixes for bsc#1031392).\n- btrfs: delayed-inode: Remove wrong qgroup meta reservation calls (bsc#1031392).\n- btrfs: delayed-inode: Use new qgroup meta rsv for delayed inode and item (bsc#1031392).\n- btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667).\n- btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).\n- btrfs: fix error handling in btrfs_dev_replace_start (bsc#1107535).\n- btrfs: fix invalid attempt to free reserved space on failure to cow range (dependency for bsc#1031392).\n- btrfs: fix missing error return in btrfs_drop_snapshot (Git-fixes bsc#1109919).\n- btrfs: Fix race condition between delayed refs and blockgroup removal (Git-fixes bsc#1112263).\n- btrfs: Fix wrong btrfs_delalloc_release_extents parameter (bsc#1031392).\n- btrfs: kill trans in run_delalloc_nocow and btrfs_cross_ref_exist (dependency for bsc#1031392).\n- btrfs: make the delalloc block rsv per inode (dependency for bsc#1031392).\n- btrfs: pass delayed_refs directly to btrfs_find_delayed_ref_head (dependency for bsc#1031392).\n- btrfs: qgroup: Add quick exit for non-fs extents (dependency for bsc#1031392).\n- btrfs: qgroup: Cleanup btrfs_qgroup_prepare_account_extents function (dependency for bsc#1031392).\n- btrfs: qgroup: Cleanup the remaining old reservation counters (bsc#1031392).\n- btrfs: qgroup: Commit transaction in advance to reduce early EDQUOT (bsc#1031392).\n- btrfs: qgroup: Do not use root->qgroup_meta_rsv for qgroup (bsc#1031392).\n- btrfs: qgroup: Fix wrong qgroup reservation update for relationship modification (bsc#1031392).\n- btrfs: qgroup: Introduce function to convert META_PREALLOC into META_PERTRANS (bsc#1031392).\n- btrfs: qgroup: Introduce helpers to update and access new qgroup rsv (bsc#1031392).\n- btrfs: qgroup: Make qgroup_reserve and its callers to use separate reservation type (bsc#1031392).\n- btrfs: qgroup: Skeleton to support separate qgroup reservation type (bsc#1031392).\n- btrfs: qgroups: opencode qgroup_free helper (dependency for bsc#1031392).\n- btrfs: qgroup: Split meta rsv type into meta_prealloc and meta_pertrans (bsc#1031392).\n- btrfs: qgroup: Update trace events for metadata reservation (bsc#1031392).\n- btrfs: qgroup: Update trace events to use new separate rsv types (bsc#1031392).\n- btrfs: qgroup: Use independent and accurate per inode qgroup rsv (bsc#1031392).\n- btrfs: qgroup: Use root::qgroup_meta_rsv_* to record qgroup meta reserved space (bsc#1031392).\n- btrfs: qgroup: Use separate meta reservation type for delalloc (bsc#1031392).\n- btrfs: remove type argument from comp_tree_refs (dependency for bsc#1031392).\n- btrfs: rework outstanding_extents (dependency for bsc#1031392).\n- btrfs: switch args for comp_*_refs (dependency for bsc#1031392).\n- btrfs: Take trans lock before access running trans in check_delayed_ref (Follow up fixes for bsc#1031392).\n- ceph: avoid a use-after-free in ceph_destroy_options() (bsc#1112007).\n- cfg80211: fix a type issue in ieee80211_chandef_to_operating_class() (bnc#1012382).\n- cfg80211: nl80211_update_ft_ies() to validate NL80211_ATTR_IE (bnc#1012382).\n- cfq: Give a chance for arming slice idle timer in case of group_idle (bnc#1012382).\n- cgroup: Fix deadlock in cpu hotplug path (bnc#1012382).\n- cgroup, netclassid: add a preemption point to write_classid (bnc#1098996).\n- cifs: check for STATUS_USER_SESSION_DELETED (bsc#1112902).\n- cifs: connect to servername instead of IP for IPC$ share (bsc#1106359).\n- cifs: fix memory leak in SMB2_open() (bsc#1112894).\n- cifs: Fix use after free of a mid_q_entry (bsc#1112903).\n- cifs: fix wrapping bugs in num_entries() (bnc#1012382).\n- cifs: integer overflow in in SMB2_ioctl() (bsc#1012382).\n- cifs: prevent integer overflow in nxt_dir_entry() (bnc#1012382).\n- cifs: read overflow in is_valid_oplock_break() (bnc#1012382).\n- clk: imx6ul: fix missing of_node_put() (bnc#1012382).\n- clocksource/drivers/ti-32k: Add CLOCK_SOURCE_SUSPEND_NONSTOP flag for non-am43 SoCs (bnc#1012382).\n- config.sh: set BUGZILLA_PRODUCT for SLE12-SP3\n- coresight: Handle errors in finding input/output ports (bnc#1012382).\n- coresight: tpiu: Fix disabling timeouts (bnc#1012382).\n- cpu/hotplug: Fix SMT supported evaluation (bsc#1089343).\n- crypto: mxs-dcp - Fix wait logic on chan threads (bnc#1012382).\n- crypto: sharah - Unregister correct algorithms for SAHARA 3 (bnc#1012382).\n- crypto: skcipher - Fix -Wstringop-truncation warnings (bnc#1012382).\n- Define dependencies of in-kernel KMPs statically This allows us to use rpm's internal dependency generator (bsc#981083).\n- Define early_radix_enabled() (bsc#1094244).\n- dmaengine: pl330: fix irq race with terminate_all (bnc#1012382).\n- dm cache: fix resize crash if user does not reload cache table (bnc#1012382).\n- dm thin metadata: fix __udivdi3 undefined on 32-bit (bnc#1012382).\n- dm thin metadata: try to avoid ever aborting transactions (bnc#1012382).\n- Do not ship firmware (bsc#1054239). Pull firmware from kernel-firmware instead.\n- drivers: net: cpsw: fix parsing of phy-handle DT property in dual_emac config (bnc#1012382).\n- drivers: net: cpsw: fix segfault in case of bad phy-handle (bnc#1012382).\n- drivers/tty: add error handling for pcmcia_loop_config (bnc#1012382).\n- drm/amdgpu: Fix SDMA HQD destroy error on gfx_v7 (bnc#1012382).\n- drm/amdkfd: Fix error codes in kfd_get_process (bnc#1012382).\n- drm/nouveau/drm/nouveau: Use pm_runtime_get_noresume() in connector_detect() (bnc#1012382).\n- drm/nouveau/TBDdevinit: do not fail when PMU/PRE_OS is missing from VBIOS (bnc#1012382).\n- drm/nouveau: tegra: Detach from ARM DMA/IOMMU mapping (bnc#1012382).\n- drm/virtio: fix bounds check in virtio_gpu_cmd_get_capset() (bsc#1106929)\n- Drop dtb-source.spec and move the sources to kernel-source (bsc#1011920)\n- e1000: check on netif_running() before calling e1000_up() (bnc#1012382).\n- e1000: ensure to free old tx/rx rings in set_ringparam() (bnc#1012382).\n- ebtables: arpreply: Add the standard target sanity check (bnc#1012382).\n- edac, thunderx: Fix memory leak in thunderx_l2c_threaded_isr() (bsc#1114648).\n- ethernet: ti: davinci_emac: add missing of_node_put after calling of_parse_phandle (bnc#1012382).\n- ethtool: Remove trailing semicolon for static inline (bnc#1012382).\n- ethtool: restore erroneously removed break in dev_ethtool (bsc#1114229).\n- ext4: avoid divide by zero fault when deleting corrupted inline directories (bnc#1012382).\n- ext4: do not mark mmp buffer head dirty (bnc#1012382).\n- ext4: fix online resize's handling of a too-small final block group (bnc#1012382).\n- ext4: fix online resizing for bigalloc file systems with a 1k block size (bnc#1012382).\n- ext4: recalucate superblock checksum after updating free blocks/inodes (bnc#1012382).\n- f2fs: do not set free of current section (bnc#1012382).\n- f2fs: fix to do sanity check with {sit,nat}_ver_bitmap_bytesize (bnc#1012382).\n- fbdev: Distinguish between interlaced and progressive modes (bnc#1012382).\n- fbdev: fix broken menu dependencies (bsc#1106929)\n- fbdev/omapfb: fix omapfb_memory_read infoleak (bnc#1012382).\n- fbdev/via: fix defined but not used warning (bnc#1012382).\n- floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl (bnc#1012382).\n- fs/cifs: do not translate SFM_SLASH (U+F026) to backslash (bnc#1012382).\n- fs/cifs: suppress a string overflow warning (bnc#1012382).\n- fs/eventpoll: loosen irq-safety when possible (bsc#1096052).\n- gfs2: Special-case rindex for gfs2_grow (bnc#1012382).\n- gpio: adp5588: Fix sleep-in-atomic-context bug (bnc#1012382).\n- gpiolib: Mark gpio_suffixes array with __maybe_unused (bnc#1012382).\n- gpio: ml-ioh: Fix buffer underwrite on probe error path (bnc#1012382).\n- gpio: tegra: Move driver registration to subsys_init level (bnc#1012382).\n- gso_segment: Reset skb->mac_len after modifying network header (bnc#1012382).\n- hexagon: modify ffs() and fls() to return int (bnc#1012382).\n- hid: hid-ntrig: add error handling for sysfs_create_group (bnc#1012382).\n- hid: sony: Support DS4 dongle (bnc#1012382).\n- hid: sony: Update device ids (bnc#1012382).\n- hv: avoid crash in vmbus sysfs files (bnc#1108377).\n- hwmon: (adt7475) Make adt7475_read_word() return errors (bnc#1012382).\n- hwmon: (ina2xx) fix sysfs shunt resistor read access (bnc#1012382).\n- i2c: i2c-scmi: fix for i2c_smbus_write_block_data (bnc#1012382).\n- i2c: i801: Allow ACPI AML access I/O ports not reserved for SMBus (bnc#1012382).\n- i2c: i801: fix DNV's SMBCTRL register offset (bnc#1012382).\n- i2c: uniphier-f: issue STOP only for last message or I2C_M_STOP (bnc#1012382).\n- i2c: uniphier: issue STOP only for last message or I2C_M_STOP (bnc#1012382).\n- i2c: xiic: Make the start and the byte count write atomic (bnc#1012382).\n- i2c: xlp9xx: Add support for SMBAlert (bsc#1103308).\n- i2c: xlp9xx: Fix case where SSIF read transaction completes early (bsc#1103308).\n- i2c: xlp9xx: Fix issue seen when updating receive length (bsc#1103308).\n- i2c: xlp9xx: Make sure the transfer size is not more than I2C_SMBUS_BLOCK_SIZE (bsc#1103308).\n- ib/ipoib: Avoid a race condition between start_xmit and cm_rep_handler (bnc#1012382).\n- ib/srp: Avoid that sg_reset -d ${srp_device} triggers an infinite loop (bnc#1012382).\n- input: atakbd - fix Atari CapsLock behaviour (bnc#1012382).\n- input: atakbd - fix Atari keymap (bnc#1012382).\n- input: atmel_mxt_ts - only use first T9 instance (bnc#1012382).\n- input: elantech - enable middle button of touchpad on ThinkPad P72 (bnc#1012382).\n- iommu/amd: Return devid as alias for ACPI HID devices (bsc#1106105).\n- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bnc#1012382).\n- iommu/ipmmu-vmsa: Fix allocation in atomic context (bnc#1012382).\n- ip6_tunnel: be careful when accessing the inner header (bnc#1012382).\n- ipmi:ssif: Add support for multi-part transmit messages > 2 parts (bsc#1103308).\n- ip_tunnel: be careful when accessing the inner header (bnc#1012382).\n- ipv4: fix use-after-free in ip_cmsg_recv_dstaddr() (bnc#1012382).\n- ipv6: fix possible use-after-free in ip6_xmit() (bnc#1012382).\n- iw_cxgb4: only allow 1 flush on user qps (bnc#1012382).\n- ixgbe: pci_set_drvdata must be called before register_netdev (Git-fixes bsc#1109923).\n- jffs2: return -ERANGE when xattr buffer is too small (bnc#1012382).\n- KABI: move the new handler to end of machdep_calls and hide it from genksyms (bsc#1094244).\n- kABI: protect struct hnae_desc_cb (kabi).\n- kbuild: add .DELETE_ON_ERROR special target (bnc#1012382).\n- kernel-obs-build.spec.in: add --no-hostonly-cmdline to dracut invocation (boo#1062303). call dracut with --no-hostonly-cmdline to avoid the random rootfs UUID being added into the initrd's /etc/cmdline.d/95root-dev.conf\n- kernel-obs-build: use pae and lpae kernels where available (bsc#1073579).\n- kernel/params.c: downgrade warning for unsafe parameters (bsc#1050549).\n- kprobes/x86: Release insn_slot in failure path (bsc#1110006).\n- kthread: fix boot hang (regression) on MIPS/OpenRISC (bnc#1012382).\n- kthread: Fix use-after-free if kthread fork fails (bnc#1012382).\n- kvm: nVMX: Do not expose MPX VMX controls when guest MPX disabled (bsc#1106240).\n- kvm: nVMX: Do not flush TLB when vmcs12 uses VPID (bsc#1106240).\n- kvm: PPC: Book3S HV: Do not truncate HPTE index in xlate function (bnc#1012382).\n- kvm: x86: Do not re-{try,execute} after failed emulation in L2 (bsc#1106240).\n- kvm: x86: Do not use kvm_x86_ops->mpx_supported() directly (bsc#1106240).\n- kvm: x86: fix APIC page invalidation (bsc#1106240).\n- kvm: x86: remove eager_fpu field of struct kvm_vcpu_arch (bnc#1012382).\n- kvm/x86: remove WARN_ON() for when vm_munmap() fails (bsc#1106240).\n- kvm: x86: SVM: Call x86_spec_ctrl_set_guest/host() with interrupts disabled (bsc#1106240).\n- lib/test_hexdump.c: fix failure on big endian cpu (bsc#1106110).\n- locking/osq_lock: Fix osq_lock queue corruption (bnc#1012382).\n- locking/rwsem-xadd: Fix missed wakeup due to reordering of load (bnc#1012382).\n- lpfc: fixup crash in lpfc_els_unsol_buffer() (bsc#1107318).\n- mac80211: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bnc#1012382).\n- mac80211: fix a race between restart and CSA flows (bnc#1012382).\n- mac80211: fix setting IEEE80211_KEY_FLAG_RX_MGMT for AP mode keys (bnc#1012382).\n- mac80211: Fix station bandwidth setting after channel switch (bnc#1012382).\n- mac80211_hwsim: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bnc#1012382).\n- mac80211: mesh: fix HWMP sequence numbering to follow standard (bnc#1012382).\n- mac80211: restrict delayed tailroom needed decrement (bnc#1012382).\n- mac80211: shorten the IBSS debug messages (bnc#1012382).\n- mach64: detect the dot clock divider correctly on sparc (bnc#1012382).\n- macintosh/via-pmu: Add missing mmio accessors (bnc#1012382).\n- macros.kernel-source: define linux_arch for KMPs (boo#1098050). CONFIG_64BIT is no longer defined so KMP spec files need to include %{?linux_make_arch} in any make call to build modules or descent into the kernel directory for any reason.\n- macros.kernel-source: pass -b properly in kernel module package (bsc#1107870).\n- macros.kernel-source: pass -f properly in module subpackage (boo#1076393).\n- md-cluster: clear another node's suspend_area after the copy is finished (bnc#1012382).\n- md/raid1: exit sync request if MD_RECOVERY_INTR is set (git-fixes).\n- md/raid5: fix data corruption of replacements after originals dropped (bnc#1012382).\n- media: af9035: prevent buffer overflow on write (bnc#1012382).\n- media: exynos4-is: Prevent NULL pointer dereference in __isp_video_try_fmt() (bnc#1012382).\n- media: fsl-viu: fix error handling in viu_of_probe() (bnc#1012382).\n- media: omap3isp: zero-initialize the isp cam_xclk{a,b} initial data (bnc#1012382).\n- media: omap_vout: Fix a possible null pointer dereference in omap_vout_open() (bsc#1050431).\n- media: s3c-camif: ignore -ENOIOCTLCMD from v4l2_subdev_call for s_power (bnc#1012382).\n- media: soc_camera: ov772x: correct setting of banding filter (bnc#1012382).\n- media: tm6000: add error handling for dvb_register_adapter (bnc#1012382).\n- media: uvcvideo: Support realtek's UVC 1.5 device (bnc#1012382).\n- media: v4l: event: Prevent freeing event subscriptions while accessed (bnc#1012382).\n- media: videobuf2-core: check for q->error in vb2_core_qbuf() (bnc#1012382).\n- media: videobuf-dma-sg: Fix dma_{sync,unmap}_sg() calls (bsc#1050431).\n- mei: bus: type promotion bug in mei_nfc_if_version() (bnc#1012382).\n- memory_hotplug: cond_resched in __remove_pages (bnc#1114178).\n- mfd: omap-usb-host: Fix dts probe of children (bnc#1012382).\n- mfd: ti_am335x_tscadc: Fix struct clk memory leak (bnc#1012382).\n- misc: hmc6352: fix potential Spectre v1 (bnc#1012382).\n- misc: mic: SCIF Fix scif_get_new_port() error handling (bnc#1012382).\n- misc: ti-st: Fix memory leak in the error path of probe() (bnc#1012382).\n- mmc: mmci: stop building qcom dml as module (bsc#1110468).\n- mm: fix devmem_is_allowed() for sub-page System RAM intersections (bsc#1110006).\n- mm: get rid of vmacache_flush_all() entirely (bnc#1012382).\n- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (bnc#1012382).\n- mm: /proc/pid/pagemap: hide swap entries from unprivileged users (Git-fixes bsc#1109907).\n- mm: shmem.c: Correctly annotate new inodes for lockdep (bnc#1012382).\n- mm/vmstat.c: fix outdated vmstat_text (bnc#1012382).\n- mm/vmstat.c: skip NR_TLB_REMOTE_FLUSH* properly (bnc#1012382).\n- mm/vmstat.c: skip NR_TLB_REMOTE_FLUSH* properly (git fixes).\n- module: exclude SHN_UNDEF symbols from kallsyms api (bnc#1012382).\n- mtdchar: fix overflows in adjustment of `count` (bnc#1012382).\n- mtd/maps: fix solutionengine.c printk format warnings (bnc#1012382).\n- neighbour: confirm neigh entries when ARP packet is received (bnc#1012382).\n- net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT (bnc#1012382).\n- net: cadence: Fix a sleep-in-atomic-context bug in macb_halt_tx() (bnc#1012382).\n- net: dcb: For wild-card lookups, use priority -1, not 0 (bnc#1012382).\n- net: ethernet: mvneta: Fix napi structure mixup on armada 3700 (bsc#1110616).\n- net: ethernet: ti: cpsw: fix mdio device reference leak (bnc#1012382).\n- netfilter: x_tables: avoid stack-out-of-bounds read in xt_copy_counters_from_user (bnc#1012382).\n- net: hns: fix length and page_offset overflow when CONFIG_ARM64_64K_PAGES (bnc#1012382).\n- net: hp100: fix always-true check for link up state (bnc#1012382).\n- net: ipv4: update fnhe_pmtu when first hop's MTU changes (bnc#1012382).\n- net/ipv6: Display all addresses in output of /proc/net/if_inet6 (bnc#1012382).\n- netlabel: check for IPV4MASK in addrinfo_get (bnc#1012382).\n- net: macb: disable scatter-gather for macb on sama5d3 (bnc#1012382).\n- net/mlx4: Use cpumask_available for eq->affinity_mask (bnc#1012382).\n- net: mvneta: fix mtu change on port without link (bnc#1012382).\n- net: mvneta: fix mvneta_config_rss on armada 3700 (bsc#1110615).\n- net: mvpp2: Extract the correct ethtype from the skb for tx csum offload (bnc#1012382).\n- net: systemport: Fix wake-up interrupt race during resume (bnc#1012382).\n- net/usb: cancel pending work when unbinding smsc75xx (bnc#1012382).\n- nfc: Fix possible memory corruption when handling SHDLC I-Frame commands (bnc#1012382).\n- nfc: Fix the number of pipes (bnc#1012382).\n- nfs: add nostatflush mount option (bsc#1065726).\n- nfs: Avoid quadratic search when freeing delegations (bsc#1084760).\n- nfsd: fix corrupted reply to badly ordered compound (bnc#1012382).\n- nfs: Use an appropriate work queue for direct-write completion (bsc#1082519).\n- nfsv4.0 fix client reference leak in callback (bnc#1012382).\n- ocfs2: fix locking for res->tracking and dlm->tracking_list (bnc#1012382).\n- ocfs2: fix ocfs2 read block panic (bnc#1012382).\n- of: unittest: Disable interrupt node tests for old world MAC systems (bnc#1012382).\n- ovl: Copy inode attributes after setting xattr (bsc#1107299).\n- parport: sunbpp: fix error return code (bnc#1012382).\n- partitions/aix: append null character to print data from disk (bnc#1012382).\n- partitions/aix: fix usage of uninitialized lv_info and lvname structures (bnc#1012382).\n- Pass x86 as architecture on x86_64 and i386 (bsc#1093118).\n- pci: altera: Fix bool initialization in tlp_read_packet() (bsc#1109806).\n- pci: designware: Fix I/O space page leak (bsc#1109806).\n- pci: designware: Fix pci_remap_iospace() failure path (bsc#1109806).\n- pci: hv: Use effective affinity mask (bsc#1109772).\n- pci: OF: Fix I/O space page leak (bsc#1109806).\n- pci: pciehp: Fix unprotected list iteration in IRQ handler (bsc#1109806).\n- pci: Reprogram bridge prefetch registers on resume (bnc#1012382).\n- pci: shpchp: Fix AMD POGO identification (bsc#1109806).\n- pci: Supply CPU physical address (not bus address) to iomem_is_exclusive() (bsc#1109806).\n- pci: versatile: Fix I/O space page leak (bsc#1109806).\n- pci: versatile: Fix pci_remap_iospace() failure path (bsc#1109806).\n- pci: xgene: Fix I/O space page leak (bsc#1109806).\n- pci: xilinx: Add missing of_node_put() (bsc#1109806).\n- perf powerpc: Fix callchain ip filtering (bnc#1012382).\n- perf powerpc: Fix callchain ip filtering when return address is in a register (bnc#1012382).\n- perf probe powerpc: Ignore SyS symbols irrespective of endianness (bnc#1012382).\n- perf script python: Fix export-to-postgresql.py occasional failure (bnc#1012382).\n- perf tools: Allow overriding MAX_NR_CPUS at compile time (bnc#1012382).\n- phy: qcom-ufs: add MODULE_LICENSE tag (bsc#1110468).\n- pinctrl: qcom: spmi-gpio: Fix pmic_gpio_config_get() to be compliant (bnc#1012382).\n- pipe: actually allow root to exceed the pipe buffer limit (git-fixes).\n- platform/x86: alienware-wmi: Correct a memory leak (bnc#1012382).\n- platform/x86: toshiba_acpi: Fix defined but not used build warnings (bnc#1012382).\n- pm / core: Clear the direct_complete flag on errors (bnc#1012382).\n- powerpc/64s: move machine check SLB flushing to mm/slb.c (bsc#1094244).\n- powerpc/kdump: Handle crashkernel memory reservation failure (bnc#1012382).\n- powerpc/mce: Fix SLB rebolting during MCE recovery path (bsc#1094244).\n- powerpc/numa: Skip onlining a offline node in kdump path (bsc#1109784).\n- powerpc/numa: Use associativity if VPHN hcall is successful (bsc#1110363).\n- powerpc/perf/hv-24x7: Fix passing of catalog version number (bsc#1053043).\n- powerpc/powernv: opal_put_chars partial write fix (bnc#1012382).\n- powerpc/pseries: Defer the logging of rtas error to irq work queue (bsc#1094244).\n- powerpc/pseries: Define MCE error event section (bsc#1094244).\n- powerpc/pseries: Display machine check error details (bsc#1094244).\n- powerpc/pseries: Dump the SLB contents on SLB MCE errors (bsc#1094244).\n- powerpc/pseries: Fix build break for SPLPAR=n and CPU hotplug (bsc#1079524, git-fixes).\n- powerpc/pseries: Fix CONFIG_NUMA=n build (bsc#1067906, git-fixes).\n- powerpc/pseries: Flush SLB contents on SLB MCE errors (bsc#1094244).\n- powerpc/pseries/mm: call H_BLOCK_REMOVE (bsc#1109158).\n- powerpc/pseries/mm: factorize PTE slot computation (bsc#1109158).\n- powerpc/pseries/mm: Introducing FW_FEATURE_BLOCK_REMOVE (bsc#1109158).\n- powerpc/rtas: Fix a potential race between CPU-Offline & Migration (bsc#1111870).\n- powerpc/tm: Avoid possible userspace r1 corruption on reclaim (bsc#1109333).\n- power: vexpress: fix corruption in notifier registration (bnc#1012382).\n- printk: do not spin in printk when in nmi (bsc#1094244).\n- proc: restrict kernel stack dumps to root (bnc#1012382).\n- pstore: Fix incorrect persistent ram buffer mapping (bnc#1012382).\n- qlcnic: fix Tx descriptor corruption on 82xx devices (bnc#1012382).\n- r8169: Clear RTL_FLAG_TASK_*_PENDING when clearing RTL_FLAG_TASK_ENABLED (bnc#1012382).\n- raid10 BUG_ON in raise_barrier when force is true and conf->barrier is 0 (bnc#1012382).\n- rculist: add list_for_each_entry_from_rcu() (bsc#1084760).\n- rculist: Improve documentation for list_for_each_entry_from_rcu() (bsc#1084760).\n- rdma/cma: Do not ignore net namespace for unbound cm_id (bnc#1012382).\n- rdma/cma: Protect cma dev list with lock (bnc#1012382).\n- rdma/ucma: check fd type in ucma_migrate_id() (bnc#1012382).\n- reiserfs: add check to detect corrupted directory entry (bsc#1109818).\n- reiserfs: do not panic on bad directory entries (bsc#1109818).\n- resource: Include resource end in walk_*() interfaces (bsc#1114648).\n- Revert 'btrfs: qgroups: Retry after commit on getting EDQUOT' (bsc#1031392).\n- Revert 'dma-buf/sync-file: Avoid enable fence signaling if poll(.timeout=0)' (bsc#1111363).\n- Revert 'drm: Do not pass negative delta to ktime_sub_ns()' (bsc#1106929)\n- Revert 'drm/i915: Initialize HWS page address after GPU reset' (bsc#1106929)\n- Revert 'Drop kernel trampoline stack.' This reverts commit 85dead31706c1c1755adff90405ff9861c39c704.\n- Revert 'kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)' This reverts commit edde1f21880e3bfe244c6f98a3733b05b13533dc.\n- Revert 'kvm: x86: remove eager_fpu field of struct kvm_vcpu_arch' (kabi).\n- Revert 'media: v4l: event: Prevent freeing event subscriptions while accessed' (kabi).\n- Revert 'mm: get rid of vmacache_flush_all() entirely' (kabi).\n- Revert 'NFC: Fix the number of pipes' (kabi).\n- Revert 'proc: restrict kernel stack dumps to root' (kabi).\n- Revert 'Skip intel_crt_init for Dell XPS 8700' (bsc#1106929)\n- Revert 'tcp: add tcp_ooo_try_coalesce() helper' (kabi).\n- Revert 'tcp: call tcp_drop() from tcp_data_queue_ofo()' (kabi).\n- Revert 'tcp: fix a stale ooo_last_skb after a replace' (kabi).\n- Revert 'tcp: free batches of packets in tcp_prune_ofo_queue()' (kabi).\n- Revert 'tcp: use an RB tree for ooo receive queue' (kabi).\n- Revert 'usb: cdc-wdm: Fix a sleep-in-atomic-context bug in service_outstanding_interrupt()' (bnc#1012382).\n- Revert 'x86/fpu: Finish excising 'eagerfpu'' (kabi).\n- Revert 'x86/fpu: Remove struct fpu::counter' (kabi).\n- Revert 'x86/fpu: Remove use_eager_fpu()' (kabi).\n- ring-buffer: Allow for rescheduling when removing pages (bnc#1012382).\n- rndis_wlan: potential buffer overflow in rndis_wlan_auth_indication() (bnc#1012382).\n- rpm/kernel-binary.spec.in: Check module licenses (bsc#1083215,bsc#1083527)\n- rpm/kernel-binary.spec.in: Do not sign modules if CONFIG_MODULE_SIG=n (bsc#1035053)\n- rpm/kernel-binary.spec.in: Obsolete ftsteutates KMP (boo#997172)\n- rpm/kernel-binary.spec.in: Only kernel-syzkaller needs gcc-devel (boo#1043591).\n- rpm/kernel-docs.spec.in: Expand kernel tree directly from sources (bsc#1057199)\n- rpm/kernel-docs.spec.in: Fix and cleanup for 4.13 doc build (bsc#1048129) The whole DocBook stuff has been deleted. The PDF build still non-working thus the sub-packaging disabled so far.\n- rpm/kernel-docs.spec.in: refresh dependencies for PDF build (bsc#1048129) But it still does not work with Tex Live 2017, thus disabled yet. Also add texlive-anyfontsize for HTML math handling.\n- rpm/kernel-module-subpackage: Generate proper supplements in the template ... instead of relying on find-provides.ksyms to do it (bsc#981083).\n- rpm/kernel-source.spec.in: Do not list deleted depdendency helpers (bsc#981083).\n- rpm/kernel-spec-macros: Try harder to detect Build Service environment (bsc#1078788)\n- rtc: bq4802: add error handling for devm_ioremap (bnc#1012382).\n- rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096 (bnc#1012382).\n- s390/chsc: Add exception handler for CHSC instruction (git-fixes).\n- s390/extmem: fix gcc 8 stringop-overflow warning (bnc#1012382).\n- s390/facilites: use stfle_fac_list array size for MAX_FACILITY_BIT (bnc#1108315, LTC#171326).\n- s390/kdump: Fix elfcorehdr size calculation (git-fixes).\n- s390/kdump: Make elfcorehdr size calculation ABI compliant (git-fixes).\n- s390/mm: correct allocate_pgste proc_handler callback (git-fixes).\n- s390/qeth: do not dump past end of unknown HW header (bnc#1012382).\n- s390/qeth: fix race in used-buffer accounting (bnc#1012382).\n- s390/qeth: handle failure on workqueue creation (git-fixes).\n- s390/qeth: reset layer2 attribute on layer switch (bnc#1012382).\n- s390/qeth: use vzalloc for QUERY OAT buffer (bnc#1108315, LTC#171527).\n- s390: revert ELF_ET_DYN_BASE base changes (git-fixes).\n- s390/stacktrace: fix address ranges for asynchronous and panic stack (git-fixes).\n- sched/fair: Fix bandwidth timer clock drift condition (Git-fixes).\n- sched/fair: Fix vruntime_normalized() for remote non-migration wakeup (Git-fixes).\n- scsi: 3ware: fix return 0 on the error path of probe (bnc#1012382).\n- scsi: bnx2i: add error handling for ioremap_nocache (bnc#1012382).\n- scsi: ibmvscsi: Improve strings handling (bnc#1012382).\n- scsi: klist: Make it safe to use klists in atomic context (bnc#1012382).\n- scsi: target: fix __transport_register_session locking (bnc#1012382).\n- scsi: target/iscsi: Make iscsit_ta_authentication() respect the output buffer size (bnc#1012382).\n- selftests/efivarfs: add required kernel configs (bnc#1012382).\n- selftest: timers: Tweak raw_skew to SKIP when ADJ_OFFSET/other clock adjustments are in progress (bnc#1012382).\n- selinux: use GFP_NOWAIT in the AVC kmem_caches (bnc#1012382).\n- serial: cpm_uart: return immediately from console poll (bnc#1012382).\n- serial: imx: restore handshaking irq for imx1 (bnc#1012382).\n- signal: Properly deliver SIGSEGV from x86 uprobes (bsc#1110006).\n- slub: make ->cpu_partial unsigned int (bnc#1012382).\n- smb2: fix missing files in root share directory listing (bnc#1012382).\n- smb3: fill in statfs fsid and correct namelen (bsc#1112905).\n- sound: enable interrupt after dma buffer initialization (bnc#1012382).\n- spi: rspi: Fix interrupted DMA transfers (bnc#1012382).\n- spi: rspi: Fix invalid SPI use during system suspend (bnc#1012382).\n- spi: sh-msiof: Fix handling of write value for SISTR register (bnc#1012382).\n- spi: sh-msiof: Fix invalid SPI use during system suspend (bnc#1012382).\n- spi: tegra20-slink: explicitly enable/disable clock (bnc#1012382).\n- srcu: Allow use of Tiny/Tree SRCU from both process and interrupt context (bsc#1050549).\n- staging: android: ashmem: Fix mmap size validation (bnc#1012382).\n- staging: rt5208: Fix a sleep-in-atomic bug in xd_copy_page (bnc#1012382).\n- staging: rts5208: fix missing error check on call to rtsx_write_register (bnc#1012382).\n- staging/rts5208: Fix read overflow in memcpy (bnc#1012382).\n- stmmac: fix valid numbers of unicast filter entries (bnc#1012382).\n- stop_machine: Atomically queue and wake stopper threads (git-fixes).\n- target: log Data-Out timeouts as errors (bsc#1095805).\n- target: log NOP ping timeouts as errors (bsc#1095805).\n- target: split out helper for cxn timeout error stashing (bsc#1095805).\n- target: stash sess_err_stats on Data-Out timeout (bsc#1095805).\n- target: use ISCSI_IQN_LEN in iscsi_target_stat (bsc#1095805).\n- tcp: add tcp_ooo_try_coalesce() helper (bnc#1012382).\n- tcp: call tcp_drop() from tcp_data_queue_ofo() (bnc#1012382).\n- tcp: fix a stale ooo_last_skb after a replace (bnc#1012382).\n- tcp: free batches of packets in tcp_prune_ofo_queue() (bnc#1012382).\n- tcp: increment sk_drops for dropped rx packets (bnc#1012382).\n- tcp: use an RB tree for ooo receive queue (bnc#1012382).\n- team: Forbid enslaving team device to itself (bnc#1012382).\n- thermal: of-thermal: disable passive polling when thermal zone is disabled (bnc#1012382).\n- Tools: hv: Fix a bug in the key delete code (bnc#1012382).\n- tools/vm/page-types.c: fix 'defined but not used' warning (bnc#1012382).\n- tools/vm/slabinfo.c: fix sign-compare warning (bnc#1012382).\n- tpm: Restore functionality to xen vtpm driver (bsc#1020645, git-fixes).\n- tsl2550: fix lux1_input error in low light (bnc#1012382).\n- tty: Drop tty->count on tty_reopen() failure (bnc#1105428).\n- tty: rocket: Fix possible buffer overwrite on register_PCI (bnc#1012382).\n- tty: vt_ioctl: fix potential Spectre v1 (bnc#1012382).\n- ubifs: Check for name being NULL while mounting (bnc#1012382).\n- ucma: fix a use-after-free in ucma_resolve_ip() (bnc#1012382).\n- uio: potential double frees if __uio_register_device() fails (bnc#1012382).\n- usb: add quirk for WORLDE Controller KS49 or Prodipe MIDI 49C USB controller (bnc#1012382).\n- usb: Add quirk to support DJI CineSSD (bnc#1012382).\n- usb: Avoid use-after-free by flushing endpoints early in usb_set_interface() (bnc#1012382).\n- usb: cdc-wdm: Fix a sleep-in-atomic-context bug in service_outstanding_interrupt() (bnc#1012382).\n- usb: Do not die twice if PCI xhci host is not responding in resume (bnc#1012382).\n- usb: fix error handling in usb_driver_claim_interface() (bnc#1012382).\n- usb: gadget: fotg210-udc: Fix memory leak of fotg210->ep[i] (bnc#1012382).\n- usb: gadget: serial: fix oops when data rx'd after close (bnc#1012382).\n- usb: handle NULL config in usb_find_alt_setting() (bnc#1012382).\n- usb: host: u132-hcd: Fix a sleep-in-atomic-context bug in u132_get_frame() (bnc#1012382).\n- usb: misc: uss720: Fix two sleep-in-atomic-context bugs (bnc#1012382).\n- usb: net2280: Fix erroneous synchronization change (bnc#1012382).\n- usb: remove LPM management from usb_driver_claim_interface() (bnc#1012382).\n- usb: serial: io_ti: fix array underflow in completion handler (bnc#1012382).\n- usb: serial: kobil_sct: fix modem-status error handling (bnc#1012382).\n- usb: serial: simple: add Motorola Tetra MTP6550 id (bnc#1012382).\n- usb: serial: ti_usb_3410_5052: fix array underflow in completion handler (bnc#1012382).\n- usb: usbdevfs: restore warning for nonsensical flags (bnc#1012382).\n- usb: usbdevfs: sanitize flags more (bnc#1012382).\n- usb: wusbcore: security: cast sizeof to int for comparison (bnc#1012382).\n- usb: yurex: Check for truncation in yurex_read() (bnc#1012382).\n- usb: yurex: Fix buffer over-read in yurex_write() (bnc#1012382).\n- Use upstream version of pci-hyperv change 35a88a18d7\n- uwb: hwa-rc: fix memory leak at probe (bnc#1012382).\n- vfs: do not test owner for NFS in set_posix_acl() (bsc#1103405).\n- video: goldfishfb: fix memory leak on driver remove (bnc#1012382).\n- vmci: type promotion bug in qp_host_get_user_memory() (bnc#1012382).\n- vmw_balloon: include asm/io.h (bnc#1012382).\n- watchdog: w83627hf: Added NCT6102D support (bsc#1106434).\n- wlcore: Add missing PM call for wlcore_cmd_wait_for_event_or_timeout() (bnc#1012382).\n- wlcore: Fix memory leak in wlcore_cmd_wait_for_event_or_timeout (git-fixes).\n- x86/apic: Fix restoring boot IRQ mode in reboot and kexec/kdump (bsc#1110006).\n- x86/apic: Split disable_IO_APIC() into two functions to fix CONFIG_KEXEC_JUMP=y (bsc#1110006).\n- x86/apic: Split out restore_boot_irq_mode() from disable_IO_APIC() (bsc#1110006).\n- x86/boot: Fix 'run_size' calculation (bsc#1110006).\n- x86/cpufeature: deduplicate X86_FEATURE_L1TF_PTEINV (kabi).\n- x86/entry/64: Add two more instruction suffixes (bnc#1012382).\n- x86/entry/64: Clear registers for exceptions/interrupts, to reduce speculation attack surface (bsc#1105931).\n- x86/entry/64: sanitize extra registers on syscall entry (bsc#1105931).\n- x86/fpu: Finish excising 'eagerfpu' (bnc#1012382).\n- x86/fpu: Remove second definition of fpu in __fpu__restore_sig() (bsc#1110006).\n- x86/fpu: Remove struct fpu::counter (bnc#1012382).\n- x86/fpu: Remove use_eager_fpu() (bnc#1012382).\n- x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772).\n- x86/kaiser: Avoid loosing NMIs when using trampoline stack (bsc#1106293 bsc#1099597).\n- x86/mm: Remove in_nmi() warning from vmalloc_fault() (bnc#1012382).\n- x86: msr-index.h: Correct SNB_C1/C3_AUTO_UNDEMOTE defines (bsc#1110006).\n- x86/numa_emulation: Fix emulated-to-physical node mapping (bnc#1012382).\n- x86/paravirt: Fix some warning messages (bnc#1065600).\n- x86/percpu: Fix this_cpu_read() (bsc#1110006).\n- x86,sched: Allow topologies where NUMA nodes share an LLC (bsc#1091158, bsc#1101555).\n- x86/spec_ctrl: Fix spec_ctrl reporting (bsc#1106913, bsc#1111516).\n- x86/speculation: Apply IBPB more strictly to avoid cross-process data leak (bsc#1106913).\n- x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation (bsc#1106913).\n- x86/speculation: Propagate information about RSB filling mitigation to sysfs (bsc#1106913).\n- x86/time: Correct the attribute on jiffies' definition (bsc#1110006).\n- x86/tsc: Add missing header to tsc_msr.c (bnc#1012382).\n- x86/vdso: Fix asm constraints on vDSO syscall fallbacks (bsc#1110006).\n- x86/vdso: Fix vDSO build if a retpoline is emitted (bsc#1110006).\n- x86/vdso: Fix vDSO syscall fallback asm constraint regression (bsc#1110006).\n- x86/vdso: Only enable vDSO retpolines when enabled and supported (bsc#1110006).\n- xen: avoid crash in disable_hotplug_cpu (bnc#1012382 bsc#1106594 bsc#1042422).\n- xen: fix GCC warning and remove duplicate EVTCHN_ROW/EVTCHN_COL usage (bnc#1012382).\n- xen: issue warning message when out of grant maptrack entries (bsc#1105795).\n- xen/manage: do not complain about an empty value in control/sysrq node (bnc#1012382).\n- xen/netfront: do not bug in case of too many frags (bnc#1012382).\n- xen-netfront: fix queue name setting (bnc#1012382).\n- xen/netfront: fix waiting for xenbus state change (bnc#1012382).\n- xen-netfront: fix warn message as irq device name has '/' (bnc#1012382).\n- xen/x86/vpmu: Zero struct pt_regs before calling into sample handling code (bnc#1012382).\n- xfrm: fix 'passing zero to ERR_PTR()' warning (bnc#1012382).\n- xhci: Add missing CAS workaround for Intel Sunrise Point xHCI (bnc#1012382).\n- xhci: Do not print a warning when setting link state for disabled ports (bnc#1012382).\n- x86/kexec: Correct KEXEC_BACKUP_SRC_END off-by-one error (bsc#1114648).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-RT-12-SP3-2018-2684", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3773-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:3773-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183773-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:3773-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-November/004855.html", }, { category: "self", summary: "SUSE Bug 1011920", url: "https://bugzilla.suse.com/1011920", }, { category: "self", summary: "SUSE Bug 1012382", url: "https://bugzilla.suse.com/1012382", }, { category: "self", summary: "SUSE Bug 1012422", url: "https://bugzilla.suse.com/1012422", }, { category: "self", summary: "SUSE Bug 1020645", url: "https://bugzilla.suse.com/1020645", }, { category: "self", summary: "SUSE Bug 1031392", url: "https://bugzilla.suse.com/1031392", }, { category: "self", summary: "SUSE Bug 1035053", url: "https://bugzilla.suse.com/1035053", }, { category: "self", summary: "SUSE Bug 1042422", url: "https://bugzilla.suse.com/1042422", }, { category: "self", summary: "SUSE Bug 1043591", url: "https://bugzilla.suse.com/1043591", }, { category: "self", summary: "SUSE Bug 1048129", url: "https://bugzilla.suse.com/1048129", }, { category: "self", summary: "SUSE Bug 1050431", url: "https://bugzilla.suse.com/1050431", }, { category: "self", summary: "SUSE Bug 1050549", url: "https://bugzilla.suse.com/1050549", }, { category: "self", summary: "SUSE Bug 1053043", url: "https://bugzilla.suse.com/1053043", }, { category: "self", summary: "SUSE Bug 1054239", url: "https://bugzilla.suse.com/1054239", }, { category: "self", summary: "SUSE Bug 1057199", url: "https://bugzilla.suse.com/1057199", }, { category: "self", summary: "SUSE Bug 1065600", url: "https://bugzilla.suse.com/1065600", }, { category: "self", summary: "SUSE Bug 1065726", url: "https://bugzilla.suse.com/1065726", }, { category: "self", summary: "SUSE Bug 1067906", url: "https://bugzilla.suse.com/1067906", }, { category: "self", summary: "SUSE Bug 1073579", url: "https://bugzilla.suse.com/1073579", }, { category: "self", summary: "SUSE Bug 1076393", url: "https://bugzilla.suse.com/1076393", }, { category: "self", summary: "SUSE Bug 1078788", url: "https://bugzilla.suse.com/1078788", }, { category: "self", summary: "SUSE Bug 1079524", url: "https://bugzilla.suse.com/1079524", }, { category: "self", summary: "SUSE Bug 1082519", url: "https://bugzilla.suse.com/1082519", }, { category: "self", summary: "SUSE Bug 1083215", url: "https://bugzilla.suse.com/1083215", }, { category: "self", summary: "SUSE Bug 1083527", url: "https://bugzilla.suse.com/1083527", }, { category: "self", summary: "SUSE Bug 1084760", url: "https://bugzilla.suse.com/1084760", }, { category: "self", summary: "SUSE Bug 1089343", url: "https://bugzilla.suse.com/1089343", }, { category: "self", summary: "SUSE Bug 1091158", url: "https://bugzilla.suse.com/1091158", }, { category: "self", summary: "SUSE Bug 1093118", url: "https://bugzilla.suse.com/1093118", }, { category: "self", summary: "SUSE Bug 1094244", url: "https://bugzilla.suse.com/1094244", }, { category: "self", summary: "SUSE Bug 1094825", url: "https://bugzilla.suse.com/1094825", }, { category: "self", summary: "SUSE Bug 1095805", url: "https://bugzilla.suse.com/1095805", }, { category: "self", summary: "SUSE Bug 1096052", url: "https://bugzilla.suse.com/1096052", }, { category: "self", summary: "SUSE Bug 1098050", url: "https://bugzilla.suse.com/1098050", }, { category: "self", summary: "SUSE Bug 1098996", url: "https://bugzilla.suse.com/1098996", }, { category: "self", summary: "SUSE Bug 1099597", url: "https://bugzilla.suse.com/1099597", }, { category: "self", summary: "SUSE Bug 1101555", url: "https://bugzilla.suse.com/1101555", }, { category: "self", summary: "SUSE Bug 1103308", url: "https://bugzilla.suse.com/1103308", }, { category: "self", summary: "SUSE Bug 1103405", url: "https://bugzilla.suse.com/1103405", }, { category: "self", summary: "SUSE Bug 1104124", url: "https://bugzilla.suse.com/1104124", }, { category: "self", summary: "SUSE Bug 1105025", url: "https://bugzilla.suse.com/1105025", }, { category: "self", summary: "SUSE Bug 1105428", url: "https://bugzilla.suse.com/1105428", }, { category: "self", summary: "SUSE Bug 1105795", url: "https://bugzilla.suse.com/1105795", }, { category: "self", summary: "SUSE Bug 1105931", url: "https://bugzilla.suse.com/1105931", }, { category: "self", summary: "SUSE Bug 1106105", url: "https://bugzilla.suse.com/1106105", }, { category: "self", summary: "SUSE Bug 1106110", url: "https://bugzilla.suse.com/1106110", }, { category: "self", summary: "SUSE Bug 1106240", url: "https://bugzilla.suse.com/1106240", }, { category: "self", summary: "SUSE Bug 1106293", url: "https://bugzilla.suse.com/1106293", }, { category: "self", summary: "SUSE Bug 1106359", url: "https://bugzilla.suse.com/1106359", }, { category: "self", summary: "SUSE Bug 1106434", url: "https://bugzilla.suse.com/1106434", }, { category: "self", summary: "SUSE Bug 1106594", url: "https://bugzilla.suse.com/1106594", }, { category: "self", summary: "SUSE Bug 1106913", url: "https://bugzilla.suse.com/1106913", }, { category: "self", summary: "SUSE Bug 1106929", url: "https://bugzilla.suse.com/1106929", }, { category: "self", summary: "SUSE Bug 1107060", url: "https://bugzilla.suse.com/1107060", }, { category: "self", summary: "SUSE Bug 1107299", url: "https://bugzilla.suse.com/1107299", }, { category: "self", summary: "SUSE Bug 1107318", url: "https://bugzilla.suse.com/1107318", }, { category: "self", summary: "SUSE Bug 1107535", url: "https://bugzilla.suse.com/1107535", }, { category: "self", summary: "SUSE Bug 1107829", url: "https://bugzilla.suse.com/1107829", }, { category: "self", summary: "SUSE Bug 1107870", url: "https://bugzilla.suse.com/1107870", }, { category: "self", summary: "SUSE Bug 1108315", url: "https://bugzilla.suse.com/1108315", }, { category: "self", summary: "SUSE Bug 1108377", url: "https://bugzilla.suse.com/1108377", }, { category: "self", summary: "SUSE Bug 1108498", url: "https://bugzilla.suse.com/1108498", }, { category: "self", summary: "SUSE Bug 1109158", url: "https://bugzilla.suse.com/1109158", }, { category: "self", summary: "SUSE Bug 1109333", url: "https://bugzilla.suse.com/1109333", }, { category: "self", summary: "SUSE Bug 1109772", url: "https://bugzilla.suse.com/1109772", }, { category: "self", summary: "SUSE Bug 1109784", url: "https://bugzilla.suse.com/1109784", }, { category: "self", summary: "SUSE Bug 1109806", url: "https://bugzilla.suse.com/1109806", }, { category: "self", summary: "SUSE Bug 1109818", url: "https://bugzilla.suse.com/1109818", }, { category: "self", summary: "SUSE Bug 1109907", url: "https://bugzilla.suse.com/1109907", }, { category: "self", summary: "SUSE Bug 1109919", url: "https://bugzilla.suse.com/1109919", }, { category: "self", summary: "SUSE Bug 1109923", url: "https://bugzilla.suse.com/1109923", }, { category: "self", summary: "SUSE Bug 1110006", url: "https://bugzilla.suse.com/1110006", }, { category: "self", summary: "SUSE Bug 1110363", url: "https://bugzilla.suse.com/1110363", }, { category: "self", summary: "SUSE Bug 1110468", url: "https://bugzilla.suse.com/1110468", }, { category: "self", summary: "SUSE Bug 1110600", url: "https://bugzilla.suse.com/1110600", }, { category: "self", summary: "SUSE Bug 1110601", url: "https://bugzilla.suse.com/1110601", }, { category: "self", summary: "SUSE Bug 1110602", url: "https://bugzilla.suse.com/1110602", }, { category: "self", summary: "SUSE Bug 1110603", url: "https://bugzilla.suse.com/1110603", }, { category: "self", summary: "SUSE Bug 1110604", url: "https://bugzilla.suse.com/1110604", }, { category: "self", summary: "SUSE Bug 1110605", url: "https://bugzilla.suse.com/1110605", }, { category: "self", summary: "SUSE Bug 1110606", url: "https://bugzilla.suse.com/1110606", }, { category: "self", summary: "SUSE Bug 1110611", url: "https://bugzilla.suse.com/1110611", }, { category: "self", summary: "SUSE Bug 1110612", url: "https://bugzilla.suse.com/1110612", }, { category: "self", summary: "SUSE Bug 1110613", url: "https://bugzilla.suse.com/1110613", }, { category: "self", summary: "SUSE Bug 1110614", url: "https://bugzilla.suse.com/1110614", }, { category: "self", summary: "SUSE Bug 1110615", url: "https://bugzilla.suse.com/1110615", }, { category: "self", summary: "SUSE Bug 1110616", url: "https://bugzilla.suse.com/1110616", }, { category: "self", summary: "SUSE Bug 1110618", url: "https://bugzilla.suse.com/1110618", }, { category: "self", summary: "SUSE Bug 1110619", url: "https://bugzilla.suse.com/1110619", }, { category: "self", summary: "SUSE Bug 1111363", url: "https://bugzilla.suse.com/1111363", }, { category: "self", summary: "SUSE Bug 1111516", url: "https://bugzilla.suse.com/1111516", }, { category: "self", summary: "SUSE Bug 1111870", url: "https://bugzilla.suse.com/1111870", }, { category: "self", summary: "SUSE Bug 1112007", url: "https://bugzilla.suse.com/1112007", }, { category: "self", summary: "SUSE Bug 1112262", url: "https://bugzilla.suse.com/1112262", }, { category: "self", summary: "SUSE Bug 1112263", url: "https://bugzilla.suse.com/1112263", }, { category: "self", summary: "SUSE Bug 1112894", url: "https://bugzilla.suse.com/1112894", }, { category: "self", summary: "SUSE Bug 1112902", url: "https://bugzilla.suse.com/1112902", }, { category: "self", summary: "SUSE Bug 1112903", url: "https://bugzilla.suse.com/1112903", }, { category: "self", summary: "SUSE Bug 1112905", url: "https://bugzilla.suse.com/1112905", }, { category: "self", summary: "SUSE Bug 1113667", url: "https://bugzilla.suse.com/1113667", }, { category: "self", summary: "SUSE Bug 1113751", url: "https://bugzilla.suse.com/1113751", }, { category: "self", summary: "SUSE Bug 1113769", url: "https://bugzilla.suse.com/1113769", }, { category: "self", summary: "SUSE Bug 1114178", url: "https://bugzilla.suse.com/1114178", }, { category: "self", summary: "SUSE Bug 1114229", url: "https://bugzilla.suse.com/1114229", }, { category: "self", summary: "SUSE Bug 1114648", url: "https://bugzilla.suse.com/1114648", }, { category: "self", summary: "SUSE Bug 981083", url: "https://bugzilla.suse.com/981083", }, { category: "self", summary: "SUSE Bug 997172", url: "https://bugzilla.suse.com/997172", }, { category: "self", summary: "SUSE CVE CVE-2018-14633 page", url: "https://www.suse.com/security/cve/CVE-2018-14633/", }, { category: "self", summary: "SUSE CVE CVE-2018-18281 page", url: "https://www.suse.com/security/cve/CVE-2018-18281/", }, { category: "self", summary: "SUSE CVE CVE-2018-18386 page", url: "https://www.suse.com/security/cve/CVE-2018-18386/", }, { category: "self", summary: "SUSE CVE CVE-2018-18690 page", url: "https://www.suse.com/security/cve/CVE-2018-18690/", }, { category: "self", summary: "SUSE CVE CVE-2018-18710 page", url: "https://www.suse.com/security/cve/CVE-2018-18710/", }, { category: "self", summary: "SUSE CVE CVE-2018-9516 page", url: "https://www.suse.com/security/cve/CVE-2018-9516/", }, ], title: "Security update for the Linux RT Kernel", tracking: { current_release_date: "2018-11-15T16:48:27Z", generator: { date: "2018-11-15T16:48:27Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:3773-1", initial_release_date: "2018-11-15T16:48:27Z", revision_history: [ { date: "2018-11-15T16:48:27Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-rt-4.4.162-3.29.1.noarch", product: { name: "kernel-devel-rt-4.4.162-3.29.1.noarch", product_id: "kernel-devel-rt-4.4.162-3.29.1.noarch", }, }, { category: "product_version", name: "kernel-source-rt-4.4.162-3.29.1.noarch", product: { name: "kernel-source-rt-4.4.162-3.29.1.noarch", product_id: "kernel-source-rt-4.4.162-3.29.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-rt-4.4.162-3.29.1.x86_64", product: { name: "cluster-md-kmp-rt-4.4.162-3.29.1.x86_64", product_id: "cluster-md-kmp-rt-4.4.162-3.29.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt-4.4.162-3.29.1.x86_64", product: { name: "dlm-kmp-rt-4.4.162-3.29.1.x86_64", product_id: "dlm-kmp-rt-4.4.162-3.29.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt-4.4.162-3.29.1.x86_64", product: { name: "gfs2-kmp-rt-4.4.162-3.29.1.x86_64", product_id: "gfs2-kmp-rt-4.4.162-3.29.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-4.4.162-3.29.1.x86_64", product: { name: "kernel-rt-4.4.162-3.29.1.x86_64", product_id: "kernel-rt-4.4.162-3.29.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-base-4.4.162-3.29.1.x86_64", product: { name: "kernel-rt-base-4.4.162-3.29.1.x86_64", product_id: "kernel-rt-base-4.4.162-3.29.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-devel-4.4.162-3.29.1.x86_64", product: { name: "kernel-rt-devel-4.4.162-3.29.1.x86_64", product_id: "kernel-rt-devel-4.4.162-3.29.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-devel-4.4.162-3.29.1.x86_64", product: { name: "kernel-rt_debug-devel-4.4.162-3.29.1.x86_64", product_id: "kernel-rt_debug-devel-4.4.162-3.29.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-rt-4.4.162-3.29.1.x86_64", product: { name: "kernel-syms-rt-4.4.162-3.29.1.x86_64", product_id: "kernel-syms-rt-4.4.162-3.29.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt-4.4.162-3.29.1.x86_64", product: { name: "ocfs2-kmp-rt-4.4.162-3.29.1.x86_64", product_id: "ocfs2-kmp-rt-4.4.162-3.29.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Real Time 12 SP3", product: { name: "SUSE Linux Enterprise Real Time 12 SP3", product_id: "SUSE Linux Enterprise Real Time 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:suse-linux-enterprise-rt:12:sp3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-4.4.162-3.29.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", product_id: "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.162-3.29.1.x86_64", }, product_reference: "cluster-md-kmp-rt-4.4.162-3.29.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-4.4.162-3.29.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", product_id: "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.162-3.29.1.x86_64", }, product_reference: "dlm-kmp-rt-4.4.162-3.29.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-4.4.162-3.29.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", product_id: "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.162-3.29.1.x86_64", }, product_reference: "gfs2-kmp-rt-4.4.162-3.29.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-4.4.162-3.29.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP3", product_id: "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.162-3.29.1.noarch", }, product_reference: "kernel-devel-rt-4.4.162-3.29.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-4.4.162-3.29.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", product_id: "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.162-3.29.1.x86_64", }, product_reference: "kernel-rt-4.4.162-3.29.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-base-4.4.162-3.29.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", product_id: "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.162-3.29.1.x86_64", }, product_reference: "kernel-rt-base-4.4.162-3.29.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-4.4.162-3.29.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", product_id: "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.162-3.29.1.x86_64", }, product_reference: "kernel-rt-devel-4.4.162-3.29.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-4.4.162-3.29.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", product_id: "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.162-3.29.1.x86_64", }, product_reference: "kernel-rt_debug-devel-4.4.162-3.29.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-4.4.162-3.29.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP3", product_id: "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.162-3.29.1.noarch", }, product_reference: "kernel-source-rt-4.4.162-3.29.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-4.4.162-3.29.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", product_id: "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.162-3.29.1.x86_64", }, product_reference: "kernel-syms-rt-4.4.162-3.29.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-4.4.162-3.29.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", product_id: "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.162-3.29.1.x86_64", }, product_reference: "ocfs2-kmp-rt-4.4.162-3.29.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP3", }, ], }, vulnerabilities: [ { cve: "CVE-2018-14633", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14633", }, ], notes: [ { category: "general", text: "A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.162-3.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14633", url: "https://www.suse.com/security/cve/CVE-2018-14633", }, { category: "external", summary: "SUSE Bug 1107829 for CVE-2018-14633", url: "https://bugzilla.suse.com/1107829", }, { category: "external", summary: "SUSE Bug 1107832 for CVE-2018-14633", url: "https://bugzilla.suse.com/1107832", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.162-3.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.162-3.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-15T16:48:27Z", details: "important", }, ], title: "CVE-2018-14633", }, { cve: "CVE-2018-18281", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18281", }, ], notes: [ { category: "general", text: "Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. This is fixed in the following kernel versions: 4.9.135, 4.14.78, 4.18.16, 4.19.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.162-3.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18281", url: "https://www.suse.com/security/cve/CVE-2018-18281", }, { category: "external", summary: "SUSE Bug 1113769 for CVE-2018-18281", url: "https://bugzilla.suse.com/1113769", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.162-3.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.162-3.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-15T16:48:27Z", details: "moderate", }, ], title: "CVE-2018-18281", }, { cve: "CVE-2018-18386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18386", }, ], notes: [ { category: "general", text: "drivers/tty/n_tty.c in the Linux kernel before 4.14.11 allows local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.162-3.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18386", url: "https://www.suse.com/security/cve/CVE-2018-18386", }, { category: "external", summary: "SUSE Bug 1094825 for CVE-2018-18386", url: "https://bugzilla.suse.com/1094825", }, { category: "external", summary: "SUSE Bug 1112039 for CVE-2018-18386", url: "https://bugzilla.suse.com/1112039", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.162-3.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.162-3.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-15T16:48:27Z", details: "moderate", }, ], title: "CVE-2018-18386", }, { cve: "CVE-2018-18690", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18690", }, ], notes: [ { category: "general", text: "In the Linux kernel before 4.17, a local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandles ATTR_REPLACE operations with conversion of an attr from short to long form.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.162-3.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18690", url: "https://www.suse.com/security/cve/CVE-2018-18690", }, { category: "external", summary: "SUSE Bug 1105025 for CVE-2018-18690", url: "https://bugzilla.suse.com/1105025", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.162-3.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.162-3.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-15T16:48:27Z", details: "moderate", }, ], title: "CVE-2018-18690", }, { cve: "CVE-2018-18710", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18710", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.162-3.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18710", url: "https://www.suse.com/security/cve/CVE-2018-18710", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-18710", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.162-3.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.162-3.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-15T16:48:27Z", details: "moderate", }, ], title: "CVE-2018-18710", }, { cve: "CVE-2018-9516", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-9516", }, ], notes: [ { category: "general", text: "In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-71361580.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.162-3.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-9516", url: "https://www.suse.com/security/cve/CVE-2018-9516", }, { category: "external", summary: "SUSE Bug 1108498 for CVE-2018-9516", url: "https://bugzilla.suse.com/1108498", }, { category: "external", summary: "SUSE Bug 1123161 for CVE-2018-9516", url: "https://bugzilla.suse.com/1123161", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.162-3.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.162-3.29.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.162-3.29.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.162-3.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-11-15T16:48:27Z", details: "moderate", }, ], title: "CVE-2018-9516", }, ], }
suse-su-2018:4072-1
Vulnerability from csaf_suse
Published
2018-12-11 08:24
Modified
2018-12-11 08:24
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).
- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removed entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry could remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).
- CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).
- CVE-2018-18445: Faulty computation of numeric bounds in the BPF verifier permitted out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandled 32-bit right shifts (bnc#1112372).
- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).
- CVE-2017-18224: fs/ocfs2/aops.c omitted use of a semaphore and consequently had a race condition for access to the extent tree during read operations in DIRECT mode, which allowed local users to cause a denial of service (BUG) by modifying a certain e_cpos field (bnc#1084831).
- CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674).
The following non-security bugs were fixed:
- ACPI/APEI: Handle GSIV and GPIO notification types (bsc#1115567).
- ACPICA: Tables: Add WSMT support (bsc#1089350).
- ACPI/IORT: Fix iort_get_platform_device_domain() uninitialized pointer value (bsc#1051510).
- ACPI / LPSS: Add alternative ACPI HIDs for Cherry Trail DMA controllers (bsc#1051510).
- ACPI, nfit: Fix ARS overflow continuation (bsc#1116895).
- ACPI, nfit: Prefer _DSM over _LSR for namespace label reads (bsc#1112128).
- ACPI/nfit, x86/mce: Handle only uncorrectable machine checks (bsc#1114279).
- ACPI/nfit, x86/mce: Validate a MCE's address before using it (bsc#1114279).
- ACPI / platform: Add SMB0001 HID to forbidden_id_list (bsc#1051510).
- ACPI / processor: Fix the return value of acpi_processor_ids_walk() (bsc#1051510).
- ACPI / watchdog: Prefer iTCO_wdt always when WDAT table uses RTC SRAM (bsc#1051510).
- act_ife: fix a potential use-after-free (networking-stable-18_09_11).
- Add the cherry-picked dup id for PCI dwc fix
- Add version information to KLP_SYMBOLS file
- ALSA: ac97: Fix incorrect bit shift at AC97-SPSA control write (bsc#1051510).
- ALSA: ca0106: Disable IZD on SB0570 DAC to fix audio pops (bsc#1051510).
- ALSA: control: Fix race between adding and removing a user element (bsc#1051510).
- ALSA: hda: Add 2 more models to the power_save blacklist (bsc#1051510).
- ALSA: hda: Add ASRock N68C-S UCC the power_save blacklist (bsc#1051510).
- ALSA: hda - Add mic quirk for the Lenovo G50-30 (17aa:3905) (bsc#1051510).
- ALSA: hda - Add quirk for ASUS G751 laptop (bsc#1051510).
- ALSA: hda/ca0132 - Call pci_iounmap() instead of iounmap() (bsc#1051510).
- ALSA: hda - Fix headphone pin config for ASUS G751 (bsc#1051510).
- ALSA: hda: fix unused variable warning (bsc#1051510).
- ALSA: hda/realtek - Add auto-mute quirk for HP Spectre x360 laptop (bsc#1051510).
- ALSA: hda/realtek - Add GPIO data update helper (bsc#1051510).
- ALSA: hda/realtek - Allow skipping spec->init_amp detection (bsc#1051510).
- ALSA: hda/realtek - fix headset mic detection for MSI MS-B171 (bsc#1051510).
- ALSA: hda/realtek - Fix HP Headset Mic can't record (bsc#1051510).
- ALSA: hda/realtek - fix the pop noise on headphone for lenovo laptops (bsc#1051510).
- ALSA: hda/realtek - Fix the problem of the front MIC on the Lenovo M715 (bsc#1051510).
- ALSA: hda/realtek - Manage GPIO bits commonly (bsc#1051510).
- ALSA: hda/realtek - Simplify Dell XPS13 GPIO handling (bsc#1051510).
- ALSA: hda/realtek - Support ALC300 (bsc#1051510).
- ALSA: oss: Use kvzalloc() for local buffer allocations (bsc#1051510).
- ALSA: sparc: Fix invalid snd_free_pages() at error path (bsc#1051510).
- ALSA: usb-audio: Add vendor and product name for Dell WD19 Dock (bsc#1051510).
- ALSA: usb-audio: update quirk for B&W PX to remove microphone (bsc#1051510).
- ALSA: wss: Fix invalid snd_free_pages() at error path (bsc#1051510).
- amd/iommu: Fix Guest Virtual APIC Log Tail Address Register (bsc#1106105).
- arm64: KVM: Move CPU ID reg trap setup off the world switch path (bsc#1110998).
- arm64: KVM: Sanitize PSTATE.M when being set from userspace (bsc#1110998).
- arm64: KVM: Tighten guest core register access from userspace (bsc#1110998).
- ARM: dts: at91: add new compatibility string for macb on sama5d3 (bsc#1051510).
- ASoC: dwc: Added a quirk DW_I2S_QUIRK_16BIT_IDX_OVERRIDE to dwc (bsc#1085535)
- ASoC: Intel: cht_bsw_max98090: add support for Baytrail (bsc#1051510).
- ASoC: intel: cht_bsw_max98090_ti: Add quirk for boards using pmc_plt_clk_0 (bsc#1051510).
- ASoC: intel: skylake: Add missing break in skl_tplg_get_token() (bsc#1051510).
- ASoC: Intel: Skylake: Reset the controller in probe (bsc#1051510).
- ASoC: rsnd: adg: care clock-frequency size (bsc#1051510).
- ASoC: rsnd: do not fallback to PIO mode when -EPROBE_DEFER (bsc#1051510).
- ASoC: rt5514: Fix the issue of the delay volume applied again (bsc#1051510).
- ASoC: sigmadsp: safeload should not have lower byte limit (bsc#1051510).
- ASoC: sun8i-codec: fix crash on module removal (bsc#1051510).
- ASoC: wm8804: Add ACPI support (bsc#1051510).
- ata: Fix racy link clearance (bsc#1107866).
- ataflop: fix error handling during setup (bsc#1051510).
- ath10k: fix kernel panic issue during pci probe (bsc#1051510).
- ath10k: fix scan crash due to incorrect length calculation (bsc#1051510).
- ath10k: fix use-after-free in ath10k_wmi_cmd_send_nowait (bsc#1051510).
- ath10k: schedule hardware restart if WMI command times out (bsc#1051510).
- autofs: fix autofs_sbi() does not check super block type (git-fixes).
- autofs: fix slab out of bounds read in getname_kernel() (git-fixes).
- autofs: mount point create should honour passed in mode (git-fixes).
- badblocks: fix wrong return value in badblocks_set if badblocks are disabled (git-fixes).
- batman-adv: Avoid probe ELP information leak (bsc#1051510).
- batman-adv: Expand merged fragment buffer for full packet (bsc#1051510).
- batman-adv: fix backbone_gw refcount on queue_work() failure (bsc#1051510).
- batman-adv: fix hardif_neigh refcount on queue_work() failure (bsc#1051510).
- batman-adv: Use explicit tvlv padding for ELP packets (bsc#1051510).
- bdi: Fix another oops in wb_workfn() (bsc#1112746).
- bdi: Preserve kabi when adding cgwb_release_mutex (bsc#1112746).
- bitops: protect variables in bit_clear_unless() macro (bsc#1051510).
- bitops: protect variables in set_mask_bits() macro (bsc#1051510).
- Blacklist commit that modifies Scsi_Host/kabi (bsc#1114579)
- Blacklist sd_zbc patch that is too invasive (bsc#1114583)
- Blacklist virtio patch that uses bio_integrity_bytes() (bsc#1114585)
- blk-mq: I/O and timer unplugs are inverted in blktrace (bsc#1112713).
- block, bfq: fix wrong init of saved start time for weight raising (bsc#1112708).
- block: bfq: swap puts in bfqg_and_blkg_put (bsc#1112712).
- block: copy ioprio in __bio_clone_fast() (bsc#1082653).
- block: respect virtual boundary mask in bvecs (bsc#1113412).
- Bluetooth: btbcm: Add entry for BCM4335C0 UART bluetooth (bsc#1051510).
- Bluetooth: SMP: fix crash in unpairing (bsc#1051510).
- bnxt_en: Fix TX timeout during netpoll (networking-stable-18_10_16).
- bnxt_en: free hwrm resources, if driver probe fails (networking-stable-18_10_16).
- bonding: avoid possible dead-lock (networking-stable-18_10_16).
- bonding: fix length of actor system (networking-stable-18_11_02).
- bonding: fix warning message (networking-stable-18_10_16).
- bonding: pass link-local packets to bonding master also (networking-stable-18_10_16).
- bpf: fix partial copy of map_ptr when dst is scalar (bsc#1083647).
- bpf, net: add skb_mac_header_len helper (networking-stable-18_09_24).
- bpf/verifier: disallow pointer subtraction (bsc#1083647).
- bpf: wait for running BPF programs when updating map-in-map (bsc#1083647).
- brcmfmac: fix for proper support of 160MHz bandwidth (bsc#1051510).
- brcmfmac: fix reporting support for 160 MHz channels (bsc#1051510).
- brcmutil: really fix decoding channel info for 160 MHz bandwidth (bsc#1051510).
- bridge: do not add port to router list when receives query with source 0.0.0.0 (networking-stable-18_11_02).
- Btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667).
- Btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).
- Btrfs: fix assertion failure during fsync in no-holes mode (bsc#1118136).
- Btrfs: fix assertion on fsync of regular file when using no-holes feature (bsc#1118137).
- Btrfs: fix cur_offset in the error case for nocow (bsc#1118140).
- Btrfs: fix data corruption due to cloning of eof block (bsc#1116878).
- Btrfs: fix deadlock on tree root leaf when finding free extent (bsc#1116876).
- Btrfs: fix deadlock when writing out free space caches (bsc#1116700).
- Btrfs: fix infinite loop on inode eviction after deduplication of eof block (bsc#1116877).
- Btrfs: fix missing error return in btrfs_drop_snapshot (Git-fixes bsc#1109919).
- Btrfs: fix null pointer dereference on compressed write path error (bsc#1116698).
- Btrfs: fix use-after-free during inode eviction (bsc#1116701).
- Btrfs: fix use-after-free when dumping free space (bsc#1116862).
- Btrfs: fix warning when replaying log after fsync of a tmpfile (bsc#1116692).
- Btrfs: fix wrong dentries after fsync of file that got its parent replaced (bsc#1116693).
- Btrfs: handle errors while updating refcounts in update_ref_for_cow (Git-fixes bsc#1109915).
- Btrfs: make sure we create all new block groups (bsc#1116699).
- Btrfs: protect space cache inode alloc with GFP_NOFS (bsc#1116863).
- Btrfs: send, fix infinite loop due to directory rename dependencies (bsc#1118138).
- cachefiles: fix the race between cachefiles_bury_object() and rmdir(2) (bsc#1051510).
- can: dev: __can_get_echo_skb(): Do not crash the kernel if can_priv::echo_skb is accessed out of bounds (bsc#1051510).
- can: dev: can_get_echo_skb(): factor out non sending code to __can_get_echo_skb() (bsc#1051510).
- can: dev: __can_get_echo_skb(): print error message, if trying to echo non existing skb (bsc#1051510).
- can: dev: __can_get_echo_skb(): replace struct can_frame by canfd_frame to access frame length (bsc#1051510).
- can: hi311x: Use level-triggered interrupt (bsc#1051510).
- can: raw: check for CAN FD capable netdev in raw_sendmsg() (bsc#1051510).
- can: rcar_can: Fix erroneous registration (bsc#1051510).
- can: rx-offload: introduce can_rx_offload_get_echo_skb() and can_rx_offload_queue_sorted() functions (bsc#1051510).
- cdc-acm: correct counting of UART states in serial state notification (bsc#1051510).
- cdc-acm: do not reset notification buffer index upon urb unlinking (bsc#1051510).
- cdc-acm: fix race between reset and control messaging (bsc#1051510).
- ceph: avoid a use-after-free in ceph_destroy_options() (bsc#1111983).
- ceph: fix dentry leak in ceph_readdir_prepopulate (bsc#1114839).
- ceph: quota: fix null pointer dereference in quota check (bsc#1114839).
- cfg80211: Address some corner cases in scan result channel updating (bsc#1051510).
- cfg80211: fix use-after-free in reg_process_hint() (bsc#1051510).
- cifs: check for STATUS_USER_SESSION_DELETED (bsc#1112902).
- cifs: fix memory leak in SMB2_open() (bsc#1112894).
- cifs: Fix use after free of a mid_q_entry (bsc#1112903).
- clk: at91: Fix division by zero in PLL recalc_rate() (bsc#1051510).
- clk: fixed-factor: fix of_node_get-put imbalance (bsc#1051510).
- clk: fixed-rate: fix of_node_get-put imbalance (bsc#1051510).
- clk: mmp2: fix the clock id for sdh2_clk and sdh3_clk (bsc#1051510).
- clk: rockchip: Fix static checker warning in rockchip_ddrclk_get_parent call (bsc#1051510).
- clk: s2mps11: Add used attribute to s2mps11_dt_match (bsc#1051510).
- clk: s2mps11: Fix matching when built as module and DT node contains compatible (bsc#1051510).
- clk: samsung: exynos5420: Enable PERIS clocks for suspend (bsc#1051510).
- clk: x86: add 'ether_clk' alias for Bay Trail / Cherry Trail (bsc#1051510).
- clk: x86: Stop marking clocks as CLK_IS_CRITICAL (bsc#1051510).
- clockevents/drivers/i8253: Add support for PIT shutdown quirk (bsc#1051510).
- clocksource/drivers/ti-32k: Add CLOCK_SOURCE_SUSPEND_NONSTOP flag for non-am43 SoCs (bsc#1051510).
- clocksource/drivers/timer-atmel-pit: Properly handle error cases (bsc#1051510).
- coda: fix 'kernel memory exposure attempt' in fsync (bsc#1051510).
- configfs: replace strncpy with memcpy (bsc#1051510).
- crypto: caam - fix implicit casts in endianness helpers (bsc#1051510).
- crypto: chelsio - Fix memory corruption in DMA Mapped buffers (bsc#1051510).
- crypto: lrw - Fix out-of bounds access on counter overflow (bsc#1051510).
- crypto: simd - correctly take reqsize of wrapped skcipher into account (bsc#1051510).
- crypto: tcrypt - fix ghash-generic speed test (bsc#1051510).
- dax: Fix deadlock in dax_lock_mapping_entry() (bsc#1109951).
- debugobjects: Make stack check warning more informative (bsc#1051510).
- Documentation/l1tf: Fix small spelling typo (bsc#1051510).
- Documentation/l1tf: Fix typos (bsc#1051510).
- Documentation/l1tf: Remove Yonah processors from not vulnerable list (bsc#1051510).
- do d_instantiate/unlock_new_inode combinations safely (git-fixes).
- Do not leak MNT_INTERNAL away from internal mounts (git-fixes).
- driver/dma/ioat: Call del_timer_sync() without holding prep_lock (bsc#1051510).
- drm/amdgpu: add missing CHIP_HAINAN in amdgpu_ucode_get_load_type (bsc#1051510).
- drm/amdgpu: Fix SDMA HQD destroy error on gfx_v7 (bsc#1051510).
- drm/amdgpu: Fix vce work queue was not cancelled when suspend (bsc#1106110)
- drm/amdgpu/powerplay: fix missing break in switch statements (bsc#1113722)
- drm/ast: change resolution may cause screen blurred (boo#1112963).
- drm/ast: fixed cursor may disappear sometimes (bsc#1051510).
- drm/ast: Fix incorrect free on ioregs (bsc#1051510).
- drm/ast: Remove existing framebuffers before loading driver (boo#1112963)
- drm/dp_mst: Check if primary mstb is null (bsc#1051510).
- drm/dp_mst: Skip validating ports during destruction, just ref (bsc#1051510).
- drm/edid: Add 6 bpc quirk for BOE panel (bsc#1051510).
- drm/edid: Add 6 bpc quirk for BOE panel in HP Pavilion 15-n233sl (bsc#1113722)
- drm/edid: VSDB yCBCr420 Deep Color mode bit definitions (bsc#1051510).
- drm: fb-helper: Reject all pixel format changing requests (bsc#1113722)
- drm/hisilicon: hibmc: Do not carry error code in HiBMC framebuffer (bsc#1113722)
- drm/hisilicon: hibmc: Do not overwrite fb helper surface depth (bsc#1113722)
- drm/i915/audio: Hook up component bindings even if displays are (bsc#1113722)
- drm/i915: Do not oops during modeset shutdown after lpe audio deinit (bsc#1051510).
- drm/i915: Do not unset intel_connector->mst_port (bsc#1051510).
- drm/i915/dp: Link train Fallback on eDP only if fallback link BW can fit panel's native mode (bsc#1051510).
- drm/i915/execlists: Force write serialisation into context image vs execution (bsc#1051510).
- drm/i915: Fix ilk+ watermarks when disabling pipes (bsc#1051510).
- drm/i915/gen9+: Fix initial readout for Y tiled framebuffers (bsc#1113722)
- drm/i915/glk: Add Quirk for GLK NUC HDMI port issues (bsc#1051510).
- drm/i915/glk: Remove 99% limitation (bsc#1051510).
- drm/i915/hdmi: Add HDMI 2.0 audio clock recovery N values (bsc#1051510).
- drm/i915: Large page offsets for pread/pwrite (bsc#1051510).
- drm/i915: Mark pin flags as u64 (bsc#1051510).
- drm/i915: Restore vblank interrupts earlier (bsc#1051510).
- drm/i915: Skip vcpi allocation for MSTB ports that are gone (bsc#1051510).
- drm/i915: Write GPU relocs harder with gen3 (bsc#1051510).
- drm: mali-dp: Call drm_crtc_vblank_reset on device init (bsc#1051510).
- drm/mediatek: fix OF sibling-node lookup (bsc#1106110)
- drm/meson: add support for 1080p25 mode (bsc#1051510).
- drm/meson: Enable fast_io in meson_dw_hdmi_regmap_config (bsc#1051510).
- drm/meson: Fix OOB memory accesses in meson_viu_set_osd_lut() (bsc#1051510).
- drm/msm: fix OF child-node lookup (bsc#1106110)
- drm/nouveau: Check backlight IDs are >= 0, not > 0 (bsc#1051510).
- drm/nouveau: Do not disable polling in fallback mode (bsc#1103356).
- drm/omap: fix memory barrier bug in DMM driver (bsc#1051510).
- drm/rockchip: Allow driver to be shutdown on reboot/kexec (bsc#1051510).
- drm/sti: do not remove the drm_bridge that was never added (bsc#1100132)
- drm/sun4i: Fix an ulong overflow in the dotclock driver (bsc#1106110)
- drm/virtio: fix bounds check in virtio_gpu_cmd_get_capset() (bsc#1113722)
- e1000: check on netif_running() before calling e1000_up() (bsc#1051510).
- e1000: ensure to free old tx/rx rings in set_ringparam() (bsc#1051510).
- EDAC, {i7core,sb,skx}_edac: Fix uncorrected error counting (bsc#1114279).
- EDAC: Raise the maximum number of memory controllers (bsc#1113780).
- EDAC, skx_edac: Fix logical channel intermediate decoding (bsc#1114279).
- EDAC, thunderx: Fix memory leak in thunderx_l2c_threaded_isr() (bsc#1114279).
- eeprom: at24: change nvmem stride to 1 (bsc#1051510).
- eeprom: at24: check at24_read/write arguments (bsc#1051510).
- eeprom: at24: correctly set the size for at24mac402 (bsc#1051510).
- Enable LSPCON instead of blindly disabling HDMI
- enic: do not call enic_change_mtu in enic_probe (bsc#1051510).
- enic: handle mtu change for vf properly (bsc#1051510).
- enic: initialize enic->rfs_h.lock in enic_probe (bsc#1051510).
- ethtool: fix a privilege escalation bug (bsc#1076830).
- ext2, dax: set ext2_dax_aops for dax files (bsc#1112554).
- ext4: add missing brelse() add_new_gdb_meta_bg()'s error path (bsc#1117795).
- ext4: add missing brelse() in set_flexbg_block_bitmap()'s error path (bsc#1117794).
- ext4: add missing brelse() update_backups()'s error path (bsc#1117796).
- ext4: avoid arithemetic overflow that can trigger a BUG (bsc#1112736).
- ext4: avoid buffer leak in ext4_orphan_add() after prior errors (bsc#1117802).
- ext4: avoid buffer leak on shutdown in ext4_mark_iloc_dirty() (bsc#1117801).
- ext4: avoid divide by zero fault when deleting corrupted inline directories (bsc#1112735).
- ext4: avoid potential extra brelse in setup_new_flex_group_blocks() (bsc#1117792).
- ext4: check for NUL characters in extended attribute's name (bsc#1112732).
- ext4: check to make sure the rename(2)'s destination is not freed (bsc#1112734).
- ext4: do not mark mmp buffer head dirty (bsc#1112743).
- ext4: fix buffer leak in __ext4_read_dirblock() on error path (bsc#1117807).
- ext4: fix buffer leak in ext4_xattr_move_to_block() on error path (bsc#1117806).
- ext4: fix missing cleanup if ext4_alloc_flex_bg_array() fails while resizing (bsc#1117798).
- ext4: fix online resize's handling of a too-small final block group (bsc#1112739).
- ext4: fix online resizing for bigalloc file systems with a 1k block size (bsc#1112740).
- ext4: fix possible inode leak in the retry loop of ext4_resize_fs() (bsc#1117799).
- ext4: fix possible leak of sbi->s_group_desc_leak in error path (bsc#1117803).
- ext4: fix possible leak of s_journal_flag_rwsem in error path (bsc#1117804).
- ext4: fix setattr project check in fssetxattr ioctl (bsc#1117789).
- ext4: fix spectre gadget in ext4_mb_regular_allocator() (bsc#1112733).
- ext4: fix use-after-free race in ext4_remount()'s error path (bsc#1117791).
- ext4: initialize retries variable in ext4_da_write_inline_data_begin() (bsc#1117788).
- ext4: propagate error from dquot_initialize() in EXT4_IOC_FSSETXATTR (bsc#1117790).
- ext4: recalucate superblock checksum after updating free blocks/inodes (bsc#1112738).
- ext4: release bs.bh before re-using in ext4_xattr_block_find() (bsc#1117805).
- ext4: reset error code in ext4_find_entry in fallback (bsc#1112731).
- ext4: show test_dummy_encryption mount option in /proc/mounts (bsc#1112741).
- fbdev: fix broken menu dependencies (bsc#1113722)
- fbdev/omapfb: fix omapfb_memory_read infoleak (bsc#1051510).
- firmware: dcdbas: Add support for WSMT ACPI table (bsc#1089350 ).
- firmware: dcdbas: include linux/io.h (bsc#1089350).
- Fix kABI for 'Ensure we commit after writeback is complete' (bsc#1111809).
- floppy: fix race condition in __floppy_read_block_0() (bsc#1051510).
- flow_dissector: do not dissect l4 ports for fragments (networking-stable-18_11_21).
- fscache: fix race between enablement and dropping of object (bsc#1107385).
- fs: dcache: Avoid livelock between d_alloc_parallel and __d_add (git-fixes).
- fs/dcache.c: fix kmemcheck splat at take_dentry_name_snapshot() (git-fixes).
- fs: dcache: Use READ_ONCE when accessing i_dir_seq (git-fixes).
- fs: Make extension of struct super_block transparent (bsc#1117822).
- fsnotify: Fix busy inodes during unmount (bsc#1117822).
- fsnotify: fix ignore mask logic in fsnotify() (bsc#1115074).
- fs/quota: Fix spectre gadget in do_quotactl (bsc#1112745).
- ftrace: Fix debug preempt config name in stack_tracer_{en,dis}able (bsc#1117172).
- ftrace: Fix kmemleak in unregister_ftrace_graph (bsc#1117181).
- ftrace: Fix memleak when unregistering dynamic ops when tracing disabled (bsc#1117174).
- ftrace: Remove incorrect setting of glob search field (bsc#1117184).
- genirq: Fix race on spurious interrupt detection (bsc#1051510).
- getname_kernel() needs to make sure that ->name != ->iname in long case (git-fixes).
- gpio: do not free unallocated ida on gpiochip_add_data_with_key() error path (bsc#1051510).
- grace: replace BUG_ON by WARN_ONCE in exit_net hook (git-fixes).
- gso_segment: Reset skb->mac_len after modifying network header (networking-stable-18_09_24).
- hfsplus: do not return 0 when fill_super() failed (bsc#1051510).
- hfsplus: stop workqueue when fill_super() failed (bsc#1051510).
- hfs: prevent crash on exit from failed search (bsc#1051510).
- HID: hiddev: fix potential Spectre v1 (bsc#1051510).
- HID: hid-sensor-hub: Force logical minimum to 1 for power and report state (bsc#1051510).
- HID: quirks: fix support for Apple Magic Keyboards (bsc#1051510).
- HID: sensor-hub: Restore fixup for Lenovo ThinkPad Helix 2 sensor hub report (bsc#1051510).
- HID: uhid: forbid UHID_CREATE under KERNEL_DS or elevated privileges (bsc#1051510).
- hv: avoid crash in vmbus sysfs files (bnc#1108377).
- hv_netvsc: fix schedule in RCU context ().
- hv_netvsc: ignore devices that are not PCI (networking-stable-18_09_11).
- hwmon: (core) Fix double-free in __hwmon_device_register() (bsc#1051510).
- hwmon: (ibmpowernv) Remove bogus __init annotations (bsc#1051510).
- hwmon: (ina2xx) Fix current value calculation (bsc#1051510).
- hwmon (ina2xx) Fix NULL id pointer in probe() (bsc#1051510).
- hwmon: (nct6775) Fix potential Spectre v1 (bsc#1051510).
- hwmon: (pmbus) Fix page count auto-detection (bsc#1051510).
- hwmon: (pwm-fan) Set fan speed to 0 on suspend (bsc#1051510).
- hwmon: (raspberrypi) Fix initial notify (bsc#1051510).
- hwmon: (w83795) temp4_type has writable permission (bsc#1051510).
- hwrng: core - document the quality field (bsc#1051510).
- hypfs_kill_super(): deal with failed allocations (bsc#1051510).
- i2c: i2c-scmi: fix for i2c_smbus_write_block_data (bsc#1051510).
- i2c: rcar: cleanup DMA for all kinds of failure (bsc#1051510).
- ibmvnic: fix accelerated VLAN handling ().
- ibmvnic: fix index in release_rx_pools (bsc#1115440, bsc#1115433).
- ibmvnic: remove ndo_poll_controller ().
- ibmvnic: Update driver queues after change in ring size support ().
- iio: accel: adxl345: convert address field usage in iio_chan_spec (bsc#1051510).
- iio: ad5064: Fix regulator handling (bsc#1051510).
- iio: adc: at91: fix acking DRDY irq on simple conversions (bsc#1051510).
- iio: adc: at91: fix wrong channel number in triggered buffer mode (bsc#1051510).
- iio: adc: imx25-gcq: Fix leak of device_node in mx25_gcq_setup_cfgs() (bsc#1051510).
- iio:st_magn: Fix enable device after trigger (bsc#1051510).
- ima: fix showing large 'violations' or 'runtime_measurements_count' (bsc#1051510).
- include/linux/pfn_t.h: force '~' to be parsed as an unary operator (bsc#1051510).
- inet: make sure to grab rcu_read_lock before using ireq->ireq_opt (networking-stable-18_10_16).
- Input: atakbd - fix Atari CapsLock behaviour (bsc#1051510).
- Input: atakbd - fix Atari keymap (bsc#1051510).
- Input: elan_i2c - add ACPI ID for Lenovo IdeaPad 330-15IGM (bsc#1051510).
- Input: synaptics - avoid using uninitialized variable when probing (bsc#1051510).
- Input: xpad - add PDP device id 0x02a4 (bsc#1051510).
- Input: xpad - add support for Xbox1 PDP Camo series gamepad (bsc#1051510).
- Input: xpad - avoid using __set_bit() for capabilities (bsc#1051510).
- Input: xpad - fix some coding style issues (bsc#1051510).
- intel_th: pci: Add Ice Lake PCH support (bsc#1051510).
- iommu/arm-smmu: Ensure that page-table updates are visible before TLBI (bsc#1106237).
- iommu/arm-smmu: Error out only if not enough context interrupts (bsc#1106237).
- iommu/ipmmu-vmsa: Fix crash on early domain free (bsc#1106105).
- iommu/vt-d: Add definitions for PFSID (bsc#1106237).
- iommu/vt-d: Fix dev iotlb pfsid use (bsc#1106237).
- iommu/vt-d: Fix NULL pointer dereference in prq_event_thread() (bsc#1106105).
- iommu/vt-d: Fix scatterlist offset handling (bsc#1106237).
- iommu/vt-d: Use memunmap to free memremap (bsc#1106105).
- ip6_tunnel: be careful when accessing the inner header (networking-stable-18_10_16).
- ip6_tunnel: Fix encapsulation layout (networking-stable-18_11_02).
- ip6_vti: fix a null pointer deference when destroy vti6 tunnel (networking-stable-18_09_11).
- ipmi: Fix timer race with module unload (bsc#1051510).
- ip_tunnel: be careful when accessing the inner header (networking-stable-18_10_16).
- ip_tunnel: do not force DF when MTU is locked (networking-stable-18_11_21).
- ipv4: lock mtu in fnhe when received PMTU < net.ipv4.route.min_pmtu (networking-stable-18_11_21).
- ipv4: tcp: send zero IPID for RST and ACK sent in SYN-RECV and TIME-WAIT state (networking-stable-18_09_11).
- ipv6: Fix PMTU updates for UDP/raw sockets in presence of VRF (networking-stable-18_11_21).
- ipv6: fix possible use-after-free in ip6_xmit() (networking-stable-18_09_24).
- ipv6: mcast: fix a use-after-free in inet6_mc_check (networking-stable-18_11_02).
- ipv6/ndisc: Preserve IPv6 control buffer if protocol error handlers are called (networking-stable-18_11_02).
- ipv6: take rcu lock in rawv6_send_hdrinc() (networking-stable-18_10_16).
- iwlwifi: dbg: allow wrt collection before ALIVE (bsc#1051510).
- iwlwifi: dbg: do not crash if the firmware crashes in the middle of a debug dump (bsc#1051510).
- iwlwifi: do not WARN on trying to dump dead firmware (bsc#1051510).
- iwlwifi: mvm: Allow TKIP for AP mode (bsc#1051510).
- iwlwifi: mvm: check for n_profiles validity in EWRD ACPI (bsc#1051510).
- iwlwifi: mvm: check for short GI only for OFDM (bsc#1051510).
- iwlwifi: mvm: check return value of rs_rate_from_ucode_rate() (bsc#1051510).
- iwlwifi: mvm: clear HW_RESTART_REQUESTED when stopping the interface (bsc#1051510).
- iwlwifi: mvm: do not use SAR Geo if basic SAR is not used (bsc#1051510).
- iwlwifi: mvm: fix BAR seq ctrl reporting (bsc#1051510).
- iwlwifi: mvm: fix regulatory domain update when the firmware starts (bsc#1051510).
- iwlwifi: mvm: open BA session only when sta is authorized (bsc#1051510).
- iwlwifi: mvm: send BCAST management frames to the right station (bsc#1051510).
- iwlwifi: mvm: support sta_statistics() even on older firmware (bsc#1051510).
- iwlwifi: pcie: avoid empty free RB queue (bsc#1051510).
- iwlwifi: pcie: gen2: build A-MSDU only for GSO (bsc#1051510).
- iwlwifi: pcie gen2: check iwl_pcie_gen2_set_tb() return value (bsc#1051510).
- jbd2: fix use after free in jbd2_log_do_checkpoint() (bsc#1113257).
- KABI fix for 'NFSv4.1: Fix up replays of interrupted requests' (git-fixes).
- kABI: Hide get_msr_feature() in kvm_x86_ops (bsc#1106240).
- KABI: hide new member in struct iommu_table from genksyms (bsc#1061840).
- KABI: mask raw in struct bpf_reg_state (bsc#1083647).
- KABI: powerpc: export __find_linux_pte as __find_linux_pte_or_hugepte (bsc#1061840).
- KABI: powerpc: Revert npu callback signature change (bsc#1055120).
- KABI: protect struct fib_nh_exception (kabi).
- KABI: protect struct rtable (kabi).
- KABI/severities: ignore __xive_vm_h_* KVM internal symbols.
- Kbuild: fix # escaping in .cmd files for future Make (git-fixes).
- kbuild: fix kernel/bounds.c 'W=1' warning (bsc#1051510).
- kbuild: move '_all' target out of $(KBUILD_SRC) conditional (bsc#1114279).
- kernfs: update comment about kernfs_path() return value (bsc#1051510).
- kgdboc: Passing ekgdboc to command line causes panic (bsc#1051510).
- kprobes/x86: Fix %p uses in error messages (bsc#1110006).
- KVM: arm/arm64: Introduce vcpu_el1_is_32bit (bsc#1110998).
- KVM: Make VM ioctl do valloc for some archs (bsc#1111506).
- KVM: nVMX: Always reflect #NM VM-exits to L1 (bsc#1106240).
- KVM: nVMX: move check_vmentry_postreqs() call to nested_vmx_enter_non_root_mode() (bsc#1106240).
- KVM: PPC: Add pt_regs into kvm_vcpu_arch and move vcpu->arch.gpr[] into it (bsc#1061840).
- KVM: PPC: Avoid marking DMA-mapped pages dirty in real mode (bsc#1061840).
- KVM: PPC: Book3S: Add MMIO emulation for VMX instructions (bsc#1061840).
- KVM: PPC: Book3S: Allow backing bigger guest IOMMU pages with smaller physical pages (bsc#1061840).
- KVM: PPC: Book3S: Check KVM_CREATE_SPAPR_TCE_64 parameters (bsc#1061840).
- KVM: PPC: Book3S: Eliminate some unnecessary checks (bsc#1061840).
- KVM: PPC: Book3S: Fix compile error that occurs with some gcc versions (bsc#1061840).
- KVM: PPC: Book3S: Fix matching of hardware and emulated TCE tables (bsc#1061840).
- KVM: PPC: Book3S HV: Add of_node_put() in success path (bsc#1061840).
- KVM: PPC: Book3S HV: Add 'online' register to ONE_REG interface (bsc#1061840).
- KVM: PPC: Book3S HV: Allow creating max number of VCPUs on POWER9 (bsc#1061840).
- KVM: PPC: Book3S HV: Allow HPT and radix on the same core for POWER9 v2.2 (bsc#1061840).
- KVM: PPC: Book3S HV: Avoid crash from THP collapse during radix page fault (bsc#1061840).
- KVM: PPC: Book3S HV: Avoid shifts by negative amounts (bsc#1061840).
- KVM: PPC: Book3S HV: Check DR not IR to chose real vs virt mode MMIOs (bsc#1061840).
- KVM: PPC: Book3S HV: Do not truncate HPTE index in xlate function (bsc#1061840).
- KVM: PPC: Book3S HV: Do not use compound_order to determine host mapping size (bsc#1061840).
- KVM: PPC: Book3S HV: Do not use existing 'prodded' flag for XIVE escalations (bsc#1061840).
- KVM: PPC: Book 3S HV: Do ptesync in radix guest exit path (bsc#1061840).
- KVM: PPC: Book3S HV: Do SLB load/unload with guest LPCR value loaded (bsc#1061840).
- KVM: PPC: Book3S HV: Enable migration of decrementer register (bsc#1061840).
- KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm (bsc#1061840).
- KVM: PPC: Book3S HV: Fix conditions for starting vcpu (bsc#1061840).
- KVM: PPC: Book3S HV: Fix constant size warning (bsc#1061840).
- KVM: PPC: Book3S HV: Fix duplication of host SLB entries (bsc#1061840).
- KVM: PPC: Book3S HV: Fix guest r11 corruption with POWER9 TM workarounds (bsc#1061840).
- KVM: PPC: Book3S HV: Fix handling of large pages in radix page fault handler (bsc#1061840).
- KVM: PPC: Book3S HV: Fix handling of secondary HPTEG in HPT resizing code (bsc#1061840).
- KVM: PPC: Book3S HV: Fix inaccurate comment (bsc#1061840).
- KVM: PPC: Book3S HV: Fix kvmppc_bad_host_intr for real mode interrupts (bsc#1061840).
- KVM: PPC: Book3S HV: Fix trap number return from __kvmppc_vcore_entry (bsc#1061840).
- KVM: PPC: Book3S HV: Fix typo in kvmppc_hv_get_dirty_log_radix() (bsc#1061840).
- KVM: PPC: Book3S HV: Fix VRMA initialization with 2MB or 1GB memory backing (bsc#1061840).
- KVM: PPC: Book3S HV: Handle 1GB pages in radix page fault handler (bsc#1061840).
- KVM: PPC: Book3S HV: Improve handling of debug-trigger HMIs on POWER9 (bsc#1061840).
- KVM: PPC: Book3S HV: Keep XIVE escalation interrupt masked unless ceded (bsc#1061840).
- KVM: PPC: Book3S HV: Lockless tlbie for HPT hcalls (bsc#1061840).
- KVM: PPC: Book3S HV: Make HPT resizing work on POWER9 (bsc#1061840).
- KVM: PPC: Book3S HV: Make radix clear pte when unmapping (bsc#1061840).
- KVM: PPC: Book3S HV: Make radix use correct tlbie sequence in kvmppc_radix_tlbie_page (bsc#1061840).
- KVM: PPC: Book3S HV: Make xive_pushed a byte, not a word (bsc#1061840).
- KVM: PPC: Book3S HV: Pack VCORE IDs to access full VCPU ID space (bsc#1061840).
- KVM: PPC: Book3S HV: radix: Do not clear partition PTE when RC or write bits do not match (bsc#1061840).
- KVM: PPC: Book3S HV: Radix page fault handler optimizations (bsc#1061840).
- KVM: PPC: Book3S HV: radix: Refine IO region partition scope attributes (bsc#1061840).
- KVM: PPC: Book3S HV: Read kvm->arch.emul_smt_mode under kvm->lock (bsc#1061840).
- KVM: PPC: Book3S HV: Recursively unmap all page table entries when unmapping (bsc#1061840).
- KVM: PPC: Book3S HV: Remove useless statement (bsc#1061840).
- KVM: PPC: Book3S HV: Remove vcpu->arch.dec usage (bsc#1061840).
- KVM: PPC: Book3S HV: Send kvmppc_bad_interrupt NMIs to Linux handlers (bsc#1061840).
- KVM: PPC: Book3S HV: Set RWMR on POWER8 so PURR/SPURR count correctly (bsc#1061840).
- KVM: PPC: Book3S HV: Snapshot timebase offset on guest entry (bsc#1061840).
- KVM: PPC: Book3S HV: Streamline setting of reference and change bits (bsc#1061840).
- KVM: PPC: Book3S HV: Use a helper to unmap ptes in the radix fault path (bsc#1061840).
- KVM: PPC: Book3S HV: Use __gfn_to_pfn_memslot() in page fault handler (bsc#1061840).
- KVM: PPC: Book3S HV: XIVE: Resend re-routed interrupts on CPU priority change (bsc#1061840).
- KVM: PPC: Book3S PR: Add guest MSR parameter for kvmppc_save_tm()/kvmppc_restore_tm() (bsc#1061840).
- KVM: PPC: Book3S PR: Move kvmppc_save_tm/kvmppc_restore_tm to separate file (bsc#1061840).
- KVM: PPC: Book3S: Use correct page shift in H_STUFF_TCE (bsc#1061840).
- KVM: PPC: Fix a mmio_host_swabbed uninitialized usage issue (bsc#1061840).
- KVM: PPC: Make iommu_table::it_userspace big endian (bsc#1061840).
- KVM: PPC: Move nip/ctr/lr/xer registers to pt_regs in kvm_vcpu_arch (bsc#1061840).
- KVM: PPC: Use seq_puts() in kvmppc_exit_timing_show() (bsc#1061840).
- KVM: s390: vsie: copy wrapping keys to right place (git-fixes).
- KVM: SVM: Add MSR-based feature support for serializing LFENCE (bsc#1106240).
- KVM: svm: Ensure an IBPB on all affected CPUs when freeing a vmcb (bsc#1114279).
- KVM: VMX: re-add ple_gap module parameter (bsc#1106240).
- KVM: VMX: support MSR_IA32_ARCH_CAPABILITIES as a feature MSR (bsc#1106240).
- KVM: VMX: Tell the nested hypervisor to skip L1D flush on vmentry (bsc#1106240).
- KVM: x86: Add a framework for supporting MSR-based features (bsc#1106240).
- KVM: x86: define SVM/VMX specific kvm_arch_[alloc|free]_vm (bsc#1111506).
- KVM: x86: Fix kernel info-leak in KVM_HC_CLOCK_PAIRING hypercall (bsc#1106240).
- KVM: X86: Introduce kvm_get_msr_feature() (bsc#1106240).
- KVM/x86: kABI fix for vm_alloc/vm_free changes (bsc#1111506).
- KVM: x86: Set highest physical address bits in non-present/reserved SPTEs (bsc#1106240).
- libceph: bump CEPH_MSG_MAX_DATA_LEN (bsc#1114839).
- libceph: fall back to sendmsg for slab pages (bsc#1118316).
- libertas: call into generic suspend code before turning off power (bsc#1051510).
- libertas: do not set URB_ZERO_PACKET on IN USB transfer (bsc#1051510).
- libnvdimm, badrange: remove a WARN for list_empty (bsc#1112128).
- libnvdimm, dimm: Maximize label transfer size (bsc#1111921, bsc#1113408, bsc#1113972).
- libnvdimm: Hold reference on parent while scheduling async init (bsc#1116891).
- libnvdimm: Introduce locked DIMM capacity support (bsc#1112128).
- libnvdimm, label: change nvdimm_num_label_slots per UEFI 2.7 (bsc#1111921, bsc#1113408, bsc#1113972).
- libnvdimm, label: Fix sparse warning (bsc#1111921, bsc#1113408, bsc#1113972).
- libnvdimm: move poison list functions to a new 'badrange' file (bsc#1112128).
- libnvdimm/nfit_test: add firmware download emulation (bsc#1112128).
- libnvdimm/nfit_test: adding support for unit testing enable LSS status (bsc#1112128).
- libnvdimm, region: Fail badblocks listing for inactive regions (bsc#1116899).
- libnvdimm, testing: Add emulation for smart injection commands (bsc#1112128).
- libnvdimm, testing: update the default smart ctrl_temperature (bsc#1112128).
- lib/ubsan: add type mismatch handler for new GCC/Clang (bsc#1051510).
- lib/ubsan.c: s/missaligned/misaligned/ (bsc#1051510).
- livepatch: create and include UAPI headers ().
- llc: set SOCK_RCU_FREE in llc_sap_add_socket() (networking-stable-18_11_02).
- lockd: fix 'list_add double add' caused by legacy signal interface (git-fixes).
- loop: add recursion validation to LOOP_CHANGE_FD (bsc#1112711).
- loop: do not call into filesystem while holding lo_ctl_mutex (bsc#1112710).
- loop: fix LOOP_GET_STATUS lock imbalance (bsc#1113284).
- mac80211: Always report TX status (bsc#1051510).
- mac80211: fix TX status reporting for ieee80211s (bsc#1051510).
- mac80211_hwsim: do not omit multicast announce of first added radio (bsc#1051510).
- mac80211: minstrel: fix using short preamble CCK rates on HT clients (bsc#1051510).
- mac80211: TDLS: fix skb queue/priority assignment (bsc#1051510).
- mach64: detect the dot clock divider correctly on sparc (bsc#1051510).
- mach64: fix display corruption on big endian machines (bsc#1113722)
- mach64: fix image corruption due to reading accelerator registers (bsc#1113722)
- mailbox: PCC: handle parse error (bsc#1051510).
- make sure that __dentry_kill() always invalidates d_seq, unhashed or not (git-fixes).
- md: allow metadata updates while suspending an array - fix (git-fixes).
- MD: fix invalid stored role for a disk - try2 (git-fixes).
- md: fix NULL dereference of mddev->pers in remove_and_add_spares() (git-fixes).
- md/raid10: fix that replacement cannot complete recovery after reassemble (git-fixes).
- md/raid1: add error handling of read error from FailFast device (git-fixes).
- md/raid5-cache: disable reshape completely (git-fixes).
- md/raid5: fix data corruption of replacements after originals dropped (git-fixes).
- media: af9035: prevent buffer overflow on write (bsc#1051510).
- media: cx231xx: fix potential sign-extension overflow on large shift (bsc#1051510).
- media: dvb: fix compat ioctl translation (bsc#1051510).
- media: em28xx: fix input name for Terratec AV 350 (bsc#1051510).
- media: em28xx: use a default format if TRY_FMT fails (bsc#1051510).
- media: pci: cx23885: handle adding to list failure (bsc#1051510).
- media: tvp5150: avoid going past array on v4l2_querymenu() (bsc#1051510).
- media: tvp5150: fix switch exit in set control handler (bsc#1051510).
- media: tvp5150: fix width alignment during set_selection() (bsc#1051510).
- media: uvcvideo: Fix uvc_alloc_entity() allocation alignment (bsc#1051510).
- media: v4l2-tpg: fix kernel oops when enabling HFLIP and OSD (bsc#1051510).
- media: vsp1: Fix YCbCr planar formats pitch calculation (bsc#1051510).
- memory_hotplug: cond_resched in __remove_pages (bnc#1114178).
- mfd: arizona: Correct calling of runtime_put_sync (bsc#1051510).
- mfd: menelaus: Fix possible race condition and leak (bsc#1051510).
- mfd: omap-usb-host: Fix dts probe of children (bsc#1051510).
- mlxsw: spectrum: Fix IP2ME CPU policer configuration (networking-stable-18_11_21).
- mmc: block: avoid multiblock reads for the last sector in SPI mode (bsc#1051510).
- mmc: dw_mmc-rockchip: correct property names in debug (bsc#1051510).
- mmc: sdhci-pci-o2micro: Add quirk for O2 Micro dev 0x8620 rev 0x01 (bsc#1051510).
- mm: handle no memcg case in memcg_kmem_charge() properly (bnc#1113677).
- mm/migrate: Use spin_trylock() while resetting rate limit ().
- mm: /proc/pid/pagemap: hide swap entries from unprivileged users (Git-fixes bsc#1109907).
- mm: rework memcg kernel stack accounting (bnc#1113677).
- modpost: ignore livepatch unresolved relocations ().
- mount: Do not allow copying MNT_UNBINDABLE|MNT_LOCKED mounts (bsc#1117819).
- mount: Prevent MNT_DETACH from disconnecting locked mounts (bsc#1117820).
- mount: Retest MNT_LOCKED in do_umount (bsc#1117818).
- move changes without Git-commit out of sorted section
- neighbour: confirm neigh entries when ARP packet is received (networking-stable-18_09_24).
- net/af_iucv: drop inbound packets with invalid flags (bnc#1113501, LTC#172679).
- net/af_iucv: fix skb handling on HiperTransport xmit error (bnc#1113501, LTC#172679).
- net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT (networking-stable-18_09_24).
- net: aquantia: memory corruption on jumbo frames (networking-stable-18_10_16).
- net: bcmgenet: Poll internal PHY for GENETv5 (networking-stable-18_11_02).
- net: bcmgenet: protect stop from timeout (networking-stable-18_11_21).
- net: bcmgenet: use MAC link status for fixed phy (networking-stable-18_09_11).
- net: bridge: remove ipv6 zero address check in mcast queries (git-fixes).
- net: dsa: bcm_sf2: Call setup during switch resume (networking-stable-18_10_16).
- net: dsa: bcm_sf2: Fix unbind ordering (networking-stable-18_10_16).
- net: ena: add functions for handling Low Latency Queues in ena_com (bsc#1111696 bsc#1117561).
- net: ena: add functions for handling Low Latency Queues in ena_netdev (bsc#1111696 bsc#1117561).
- net: ena: change rx copybreak default to reduce kernel memory pressure (bsc#1111696 bsc#1117561).
- net: ena: complete host info to match latest ENA spec (bsc#1111696 bsc#1117561).
- net: ena: enable Low Latency Queues (bsc#1111696 bsc#1117561).
- net: ena: explicit casting and initialization, and clearer error handling (bsc#1111696 bsc#1117561).
- net: ena: fix auto casting to boolean (bsc#1111696 bsc#1117561).
- net: ena: fix compilation error in xtensa architecture (bsc#1111696 bsc#1117561).
- net: ena: fix crash during failed resume from hibernation (bsc#1111696 bsc#1117561).
- net: ena: fix indentations in ena_defs for better readability (bsc#1111696 bsc#1117561).
- net: ena: Fix Kconfig dependency on X86 (bsc#1111696 bsc#1117561).
- net: ena: fix NULL dereference due to untimely napi initialization (bsc#1111696 bsc#1117561).
- net: ena: fix rare bug when failed restart/resume is followed by driver removal (bsc#1111696 bsc#1117561).
- net: ena: fix warning in rmmod caused by double iounmap (bsc#1111696 bsc#1117561).
- net: ena: introduce Low Latency Queues data structures according to ENA spec (bsc#1111696 bsc#1117561).
- net: ena: limit refill Rx threshold to 256 to avoid latency issues (bsc#1111696 bsc#1117561).
- net: ena: minor performance improvement (bsc#1111696 bsc#1117561).
- net: ena: remove ndo_poll_controller (bsc#1111696 bsc#1117561).
- net: ena: remove redundant parameter in ena_com_admin_init() (bsc#1111696 bsc#1117561).
- net: ena: update driver version to 2.0.1 (bsc#1111696 bsc#1117561).
- net: ena: use CSUM_CHECKED device indication to report skb's checksum status (bsc#1111696 bsc#1117561).
- net: fec: do not dump RX FIFO register when not available (networking-stable-18_11_02).
- net-gro: reset skb->pkt_type in napi_reuse_skb() (networking-stable-18_11_21).
- net: hns: fix for unmapping problem when SMMU is on (networking-stable-18_10_16).
- net: hp100: fix always-true check for link up state (networking-stable-18_09_24).
- net: ibm: fix return type of ndo_start_xmit function ().
- net/ibmnvic: Fix deadlock problem in reset ().
- net/ibmvnic: Fix RTNL deadlock during device reset (bnc#1115431).
- net: ipmr: fix unresolved entry dumps (networking-stable-18_11_02).
- net: ipv4: do not let PMTU updates increase route MTU (git-fixes).
- net/ipv6: Display all addresses in output of /proc/net/if_inet6 (networking-stable-18_10_16).
- net/ipv6: Fix index counter for unicast addresses in in6_dump_addrs (networking-stable-18_11_02).
- netlabel: check for IPV4MASK in addrinfo_get (networking-stable-18_10_16).
- net: macb: do not disable MDIO bus at open/close time (networking-stable-18_09_11).
- net/mlx5: Check for error in mlx5_attach_interface (networking-stable-18_09_18).
- net/mlx5e: Fix selftest for small MTUs (networking-stable-18_11_21).
- net/mlx5e: Set vlan masks for all offloaded TC rules (networking-stable-18_10_16).
- net/mlx5: E-Switch, Fix memory leak when creating switchdev mode FDB tables (networking-stable-18_09_18).
- net/mlx5: E-Switch, Fix out of bound access when setting vport rate (networking-stable-18_10_16).
- net/mlx5: Fix debugfs cleanup in the device init/remove flow (networking-stable-18_09_18).
- net/mlx5: Fix use-after-free in self-healing flow (networking-stable-18_09_18).
- net/mlx5: Take only bit 24-26 of wqe.pftype_wq for page fault type (networking-stable-18_11_02).
- net: mvpp2: Extract the correct ethtype from the skb for tx csum offload (networking-stable-18_10_16).
- net: mvpp2: fix a txq_done race condition (networking-stable-18_10_16).
- net/packet: fix packet drop as of virtio gso (networking-stable-18_10_16).
- net: phy: mdio-gpio: Fix working over slow can_sleep GPIOs (networking-stable-18_11_21).
- net: qca_spi: Fix race condition in spi transfers (networking-stable-18_09_18).
- net: qmi_wwan: add Wistron Neweb D19Q1 (bsc#1051510).
- net: sched: action_ife: take reference to meta module (networking-stable-18_09_11).
- net/sched: act_pedit: fix dump of extended layered op (networking-stable-18_09_11).
- net/sched: act_sample: fix NULL dereference in the data path (networking-stable-18_09_24).
- net: sched: Fix for duplicate class dump (networking-stable-18_11_02).
- net: sched: Fix memory exposure from short TCA_U32_SEL (networking-stable-18_09_11).
- net: sched: gred: pass the right attribute to gred_change_table_def() (networking-stable-18_11_02).
- net: smsc95xx: Fix MTU range (networking-stable-18_11_21).
- net: socket: fix a missing-check bug (networking-stable-18_11_02).
- net: stmmac: Fix stmmac_mdio_reset() when building stmmac as modules (networking-stable-18_11_02).
- net: stmmac: Fixup the tail addr setting in xmit path (networking-stable-18_10_16).
- net: systemport: Fix wake-up interrupt race during resume (networking-stable-18_10_16).
- net: systemport: Protect stop from timeout (networking-stable-18_11_21).
- net: udp: fix handling of CHECKSUM_COMPLETE packets (networking-stable-18_11_02).
- net/usb: cancel pending work when unbinding smsc75xx (networking-stable-18_10_16).
- NFC: nfcmrvl_uart: fix OF child-node lookup (bsc#1051510).
- nfit_test: add error injection DSMs (bsc#1112128).
- nfit_test: fix buffer overrun, add sanity check (bsc#1112128).
- nfit_test: improve structure offset handling (bsc#1112128).
- nfit_test: prevent parsing error of nfit_test.0 (bsc#1112128).
- nfit_test: when clearing poison, also remove badrange entries (bsc#1112128).
- nfp: wait for posted reconfigs when disabling the device (networking-stable-18_09_11).
- NFS: Avoid quadratic search when freeing delegations (bsc#1084760).
- NFS: Avoid RCU usage in tracepoints (git-fixes).
- NFS: commit direct writes even if they fail partially (git-fixes).
- nfsd4: permit layoutget of executable-only files (git-fixes).
- nfsd: check for use of the closed special stateid (git-fixes).
- nfsd: CLOSE SHOULD return the invalid special stateid for NFSv4.x (x>0) (git-fixes).
- nfsd: deal with revoked delegations appropriately (git-fixes).
- nfsd: Ensure we check stateid validity in the seqid operation checks (git-fixes).
- nfsd: Fix another OPEN stateid race (git-fixes).
- nfsd: fix corrupted reply to badly ordered compound (git-fixes).
- nfsd: fix potential use-after-free in nfsd4_decode_getdeviceinfo (git-fixes).
- nfsd: Fix stateid races between OPEN and CLOSE (git-fixes).
- NFS: do not wait on commit in nfs_commit_inode() if there were no commit requests (git-fixes).
- nfsd: restrict rd_maxcount to svc_max_payload in nfsd_encode_readdir (git-fixes).
- NFS: Ensure we commit after writeback is complete (bsc#1111809).
- NFS: Fix an incorrect type in struct nfs_direct_req (git-fixes).
- NFS: Fix a typo in nfs_rename() (git-fixes).
- NFS: Fix typo in nomigration mount option (git-fixes).
- NFS: Fix unstable write completion (git-fixes).
- NFSv4.0 fix client reference leak in callback (git-fixes).
- NFSv4.1: Fix a potential layoutget/layoutrecall deadlock (git-fixes).
- NFSv4.1 fix infinite loop on I/O (git-fixes).
- NFSv4.1: Fix the client behaviour on NFS4ERR_SEQ_FALSE_RETRY (git-fixes).
- NFSv4.1: Fix up replays of interrupted requests (git-fixes).
- NFSv4: Fix a typo in nfs41_sequence_process (git-fixes).
- nl80211: Fix possible Spectre-v1 for CQM RSSI thresholds (bsc#1051510).
- nl80211: Fix possible Spectre-v1 for NL80211_TXRATE_HT (bsc#1051510).
- nospec: Include <asm/barrier.h> dependency (bsc#1114279).
- nvdimm: Clarify comment in sizeof_namespace_index (bsc#1111921, bsc#1113408, bsc#1113972).
- nvdimm: Remove empty if statement (bsc#1111921, bsc#1113408, bsc#1113972).
- nvdimm: Sanity check labeloff (bsc#1111921, bsc#1113408, bsc#1113972).
- nvdimm: Split label init out from the logic for getting config data (bsc#1111921, bsc#1113408, bsc#1113972).
- nvdimm: Use namespace index data to reduce number of label reads needed (bsc#1111921, bsc#1113408, bsc#1113972).
- nvme: Free ctrl device name on init failure ().
- ocfs2: fix a misuse a of brelse after failing ocfs2_check_dir_entry (bsc#1117817).
- ocfs2: fix locking for res->tracking and dlm->tracking_list (bsc#1117816).
- ocfs2: fix ocfs2 read block panic (bsc#1117815).
- ocfs2: free up write context when direct IO failed (bsc#1117821).
- ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent (bsc#1117808).
- of: add helper to lookup compatible child node (bsc#1106110)
- openvswitch: Fix push/pop ethernet validation (networking-stable-18_11_02).
- orangefs: fix deadlock; do not write i_size in read_iter (bsc#1051510).
- orangefs: initialize op on loop restart in orangefs_devreq_read (bsc#1051510).
- orangefs_kill_sb(): deal with allocation failures (bsc#1051510).
- orangefs: use list_for_each_entry_safe in purge_waiting_ops (bsc#1051510).
- PCI: Add Device IDs for Intel GPU 'spurious interrupt' quirk (bsc#1051510).
- PCI/ASPM: Do not initialize link state when aspm_disabled is set (bsc#1051510).
- PCI/ASPM: Fix link_state teardown on device removal (bsc#1051510).
- PCI: dwc: remove duplicate fix References: bsc#1115269 Patch has been already applied by the following commit: 9f73db8b7c PCI: dwc: Fix enumeration end when reaching root subordinate (bsc#1051510)
- PCI: hv: Do not wait forever on a device that has disappeared (bsc#1109806).
- PCI: hv: Use effective affinity mask (bsc#1109772).
- PCI: imx6: Fix link training status detection in link up check (bsc#1109806).
- PCI: iproc: Remove PAXC slot check to allow VF support (bsc#1109806).
- PCI/MSI: Warn and return error if driver enables MSI/MSI-X twice (bsc#1051510).
- PCI: Reprogram bridge prefetch registers on resume (bsc#1051510).
- PCI: vmd: Assign vector zero to all bridges (bsc#1109806).
- PCI: vmd: Detach resources after stopping root bus (bsc#1109806).
- PCI: vmd: White list for fast interrupt handlers (bsc#1109806).
- pcmcia: Implement CLKRUN protocol disabling for Ricoh bridges (bsc#1051510).
- percpu: make this_cpu_generic_read() atomic w.r.t. interrupts (bsc#1114279).
- perf: fix invalid bit in diagnostic entry (git-fixes).
- pinctrl: at91-pio4: fix has_config check in atmel_pctl_dt_subnode_to_map() (bsc#1051510).
- pinctrl: meson: fix pinconf bias disable (bsc#1051510).
- pinctrl: qcom: spmi-mpp: Fix drive strength setting (bsc#1051510).
- pinctrl: qcom: spmi-mpp: Fix err handling of pmic_mpp_set_mux (bsc#1051510).
- pinctrl: spmi-mpp: Fix pmic_mpp_config_get() to be compliant (bsc#1051510).
- pinctrl: ssbi-gpio: Fix pm8xxx_pin_config_get() to be compliant (bsc#1051510).
- pipe: match pipe_max_size data type with procfs (git-fixes).
- platform/x86: acerhdf: Add BIOS entry for Gateway LT31 v1.3307 (bsc#1051510).
- platform/x86: intel_telemetry: report debugfs failure (bsc#1051510).
- pNFS: Always free the session slot on error in nfs4_layoutget_handle_exception (git-fixes).
- pNFS: Do not release the sequence slot until we've processed layoutget on open (git-fixes).
- pNFS: Prevent the layout header refcount going to zero in pnfs_roc() (git-fixes).
- powerpc/64s/hash: Do not use PPC_INVALIDATE_ERAT on CPUs before POWER9 (bsc#1065729).
- powerpc/boot: Fix opal console in boot wrapper (bsc#1065729).
- powerpc/kvm/booke: Fix altivec related build break (bsc#1061840).
- powerpc/kvm: Switch kvm pmd allocator to custom allocator (bsc#1061840).
- powerpc/mm: Fix typo in comments (bsc#1065729).
- powerpc/mm/hugetlb: initialize the pagetable cache correctly for hugetlb (bsc#1091800).
- powerpc/mm/keys: Move pte bits to correct headers (bsc#1078248).
- powerpc/mm: Rename find_linux_pte_or_hugepte() (bsc#1061840).
- powerpc/npu-dma.c: Fix crash after __mmu_notifier_register failure (bsc#1055120).
- powerpc/perf: Update raw-event code encoding comment for power8 (bsc#1065729).
- powerpc/powernv: Add indirect levels to it_userspace (bsc#1061840).
- powerpc/powernv: Do not select the cpufreq governors (bsc#1065729).
- powerpc/powernv: Fix concurrency issue with npu->mmio_atsd_usage (bsc#1055120).
- powerpc/powernv: Fix opal_event_shutdown() called with interrupts disabled (bsc#1065729).
- powerpc/powernv/ioda2: Reduce upper limit for DMA window size (bsc#1055120).
- powerpc/powernv/ioda: Allocate indirect TCE levels on demand (bsc#1061840).
- powerpc/powernv/ioda: Finish removing explicit max window size check (bsc#1061840).
- powerpc/powernv/ioda: Remove explicit max window size check (bsc#1061840).
- powerpc/powernv: Move TCE manupulation code to its own file (bsc#1061840).
- powerpc/powernv/npu: Add lock to prevent race in concurrent context init/destroy (bsc#1055120).
- powerpc/powernv/npu: Do not explicitly flush nmmu tlb (bsc#1055120).
- powerpc/powernv/npu: Fix deadlock in mmio_invalidate() (bsc#1055120).
- powerpc/powernv/npu: Prevent overwriting of pnv_npu2_init_contex() callback parameters (bsc#1055120).
- powerpc/powernv/npu: Use flush_all_mm() instead of flush_tlb_mm() (bsc#1055120).
- powerpc/powernv/pci: Work around races in PCI bridge enabling (bsc#1055120).
- powerpc/powernv: Rework TCE level allocation (bsc#1061840).
- powerpc/pseries: Fix build break for SPLPAR=n and CPU hotplug (bsc#1079524, git-fixes).
- powerpc/pseries: Fix CONFIG_NUMA=n build (bsc#1067906, git-fixes).
- powerpc/pseries: Fix DTL buffer registration (bsc#1065729).
- powerpc/pseries: Fix how we iterate over the DTL entries (bsc#1065729).
- powerpc/pseries: Fix 'OF: ERROR: Bad of_node_put() on /cpus' during DLPAR (bsc#1113295).
- powerpc/pseries/mobility: Extend start/stop topology update scope (bsc#1116950, bsc#1115709).
- powerpc: pseries: remove dlpar_attach_node dependency on full path (bsc#1113295).
- powerpc/xive: Move definition of ESB bits (bsc#1061840).
- powerpc/xmon: Add ISA v3.0 SPRs to SPR dump (bsc#1061840).
- power: supply: max8998-charger: Fix platform data retrieval (bsc#1051510).
- pppoe: fix reception of frames with no mac header (networking-stable-18_09_24).
- printk: drop in_nmi check from printk_safe_flush_on_panic() (bsc#1112170).
- printk: Fix panic caused by passing log_buf_len to command line (bsc#1117168).
- printk/tracing: Do not trace printk_nmi_enter() (bsc#1112208).
- provide linux/set_memory.h (bsc#1113295).
- ptp: fix Spectre v1 vulnerability (bsc#1051510).
- pwm: lpss: Release runtime-pm reference from the driver's remove callback (bsc#1051510).
- pxa168fb: prepare the clock (bsc#1051510).
- qmi_wwan: Added support for Gemalto's Cinterion ALASxx WWAN interface (bsc#1051510).
- qmi_wwan: apply SET_DTR quirk to the SIMCOM shared device ID (bsc#1051510).
- qmi_wwan: Support dynamic config on Quectel EP06 (bsc#1051510).
- qrtr: add MODULE_ALIAS macro to smd (bsc#1051510).
- r8169: Clear RTL_FLAG_TASK_*_PENDING when clearing RTL_FLAG_TASK_ENABLED (bsc#1051510).
- r8169: fix NAPI handling under high load (networking-stable-18_11_02).
- race of lockd inetaddr notifiers vs nlmsvc_rqst change (git-fixes).
- RAID10 BUG_ON in raise_barrier when force is true and conf->barrier is 0 (git-fixes).
- random: rate limit unseeded randomness warnings (git-fixes).
- rculist: add list_for_each_entry_from_rcu() (bsc#1084760).
- rculist: Improve documentation for list_for_each_entry_from_rcu() (bsc#1084760).
- rds: fix two RCU related problems (networking-stable-18_09_18).
- README: Clean-up trailing whitespace
- reiserfs: add check to detect corrupted directory entry (bsc#1109818).
- reiserfs: do not panic on bad directory entries (bsc#1109818).
- remoteproc: qcom: Fix potential device node leaks (bsc#1051510).
- rename a hv patch to reduce conflicts in -AZURE
- reset: hisilicon: fix potential NULL pointer dereference (bsc#1051510).
- reset: imx7: Fix always writing bits as 0 (bsc#1051510).
- resource: Include resource end in walk_*() interfaces (bsc#1114279).
- Revert 'ceph: fix dentry leak in splice_dentry()' (bsc#1114839).
- Revert 'powerpc/64: Fix checksum folding in csum_add()' (bsc#1065729).
- Revert 'rpm/kernel-binary.spec.in: allow unsupported modules for -extra'
- Revert 'usb: dwc3: gadget: skip Set/Clear Halt when invalid' (bsc#1051510).
- rpmsg: Correct support for MODULE_DEVICE_TABLE() (git-fixes).
- rtnetlink: Disallow FDB configuration for non-Ethernet device (networking-stable-18_11_02).
- rtnetlink: fix rtnl_fdb_dump() for ndmsg header (networking-stable-18_10_16).
- rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096 (networking-stable-18_10_16).
- s390/cpum_sf: Add data entry sizes to sampling trailer entry (git-fixes).
- s390/kvm: fix deadlock when killed by oom (bnc#1113501, LTC#172235).
- s390/mm: Check for valid vma before zapping in gmap_discard (git-fixes).
- s390/mm: correct allocate_pgste proc_handler callback (git-fixes).
- s390: qeth_core_mpc: Use ARRAY_SIZE instead of reimplementing its function (bnc#1113501, LTC#172682).
- s390/qeth: fix HiperSockets sniffer (bnc#1113501, LTC#172953).
- s390: qeth: Fix potential array overrun in cmd/rc lookup (bnc#1113501, LTC#172682).
- s390/qeth: handle failure on workqueue creation (git-fixes).
- s390/qeth: report 25Gbit link speed (bnc#1113501, LTC#172959).
- s390: revert ELF_ET_DYN_BASE base changes (git-fixes).
- s390/sclp_tty: enable line mode tty even if there is an ascii console (git-fixes).
- s390/sthyi: add cache to store hypervisor info (LTC#160415, bsc#1068273).
- s390/sthyi: add s390_sthyi system call (LTC#160415, bsc#1068273).
- s390/sthyi: reorganize sthyi implementation (LTC#160415, bsc#1068273).
- sched/numa: Limit the conditions where scan period is reset ().
- scsi: core: Allow state transitions from OFFLINE to BLOCKED (bsc#1112246).
- scsi: core: Allow state transitions from OFFLINE to BLOCKED (bsc#1112246).
- scsi: core: Avoid that SCSI device removal through sysfs triggers a deadlock (bsc#1114578).
- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1104731).
- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1104731).
- scsi: libfc: retry PRLI if we cannot analyse the payload (bsc#1104731).
- scsi: libfc: retry PRLI if we cannot analyse the payload (bsc#1104731).
- scsi: libsas: remove irq save in sas_ata_qc_issue() (bsc#1114580).
- scsi: lpfc: add support to retrieve firmware logs (bsc#1114015).
- scsi: lpfc: add Trunking support (bsc#1114015).
- scsi: lpfc: Correct errors accessing fw log (bsc#1114015).
- scsi: lpfc: Correct invalid EQ doorbell write on if_type=6 (bsc#1114015).
- scsi: lpfc: Correct irq handling via locks when taking adapter offline (bsc#1114015).
- scsi: lpfc: Correct LCB RJT handling (bsc#1114015).
- scsi: lpfc: Correct loss of fc4 type on remote port address change (bsc#1114015).
- scsi: lpfc: Correct race with abort on completion path (bsc#1114015).
- scsi: lpfc: Correct soft lockup when running mds diagnostics (bsc#1114015).
- scsi: lpfc: Correct speeds on SFP swap (bsc#1114015).
- scsi: lpfc: fcoe: Fix link down issue after 1000+ link bounces (bsc#1114015).
- scsi: lpfc: Fix errors in log messages (bsc#1114015).
- scsi: lpfc: Fix GFT_ID and PRLI logic for RSCN (bsc#1114015).
- scsi: lpfc: Fix LOGO/PLOGI handling when triggerd by ABTS Timeout event (bsc#1114015).
- scsi: lpfc: Fix lpfc_sli4_read_config return value check (bsc#1114015).
- scsi: lpfc: Fix odd recovery in duplicate FLOGIs in point-to-point (bsc#1114015).
- scsi: lpfc: Implement GID_PT on Nameserver query to support faster failover (bsc#1114015).
- scsi: lpfc: Raise nvme defaults to support a larger io and more connectivity (bsc#1114015).
- scsi: lpfc: raise sg count for nvme to use available sg resources (bsc#1114015).
- scsi: lpfc: reduce locking when updating statistics (bsc#1114015).
- scsi: lpfc: Remove set but not used variable 'sgl_size' (bsc#1114015).
- scsi: lpfc: Reset link or adapter instead of doing infinite nameserver PLOGI retry (bsc#1114015).
- scsi: lpfc: Synchronize access to remoteport via rport (bsc#1114015).
- scsi: lpfc: update driver version to 12.0.0.7 (bsc#1114015).
- scsi: lpfc: update driver version to 12.0.0.8 (bsc#1114015).
- scsi: qlogicpti: Fix an error handling path in 'qpti_sbus_probe()' (bsc#1114581).
- scsi: scsi_transport_srp: Fix shost to rport translation (bsc#1114582).
- scsi: sg: fix minor memory leak in error path (bsc#1114584).
- scsi: sysfs: Introduce sysfs_{un,}break_active_protection() (bsc#1114578).
- scsi: target: Fix fortify_panic kernel exception (bsc#1114576).
- scsi: target/tcm_loop: Avoid that static checkers warn about dead code (bsc#1114577).
- scsi: target: tcmu: add read length support (bsc#1097755).
- sctp: fix race on sctp_id2asoc (networking-stable-18_11_02).
- sctp: fix strchange_flags name for Stream Change Event (networking-stable-18_11_21).
- sctp: hold transport before accessing its asoc in sctp_transport_get_next (networking-stable-18_09_11).
- sctp: not allow to set asoc prsctp_enable by sockopt (networking-stable-18_11_21).
- sctp: not increase stream's incnt before sending addstrm_in request (networking-stable-18_11_21).
- sctp: update dst pmtu with the correct daddr (networking-stable-18_10_16).
- serial: 8250: Fix clearing FIFOs in RS485 mode again (bsc#1051510).
- signal: Properly deliver SIGSEGV from x86 uprobes (bsc#1110006).
- skip LAYOUTRETURN if layout is invalid (git-fixes).
- smb2: fix missing files in root share directory listing (bsc#1112907).
- smb2: fix missing files in root share directory listing (bsc#1112907).
- smb3: fill in statfs fsid and correct namelen (bsc#1112905).
- smb3: fill in statfs fsid and correct namelen (bsc#1112905).
- smb3: fix reset of bytes read and written stats (bsc#1112906).
- smb3: fix reset of bytes read and written stats (bsc#1112906).
- smb3: on reconnect set PreviousSessionId field (bsc#1112899).
- smb3: on reconnect set PreviousSessionId field (bsc#1112899).
- soc: fsl: qbman: qman: avoid allocating from non existing gen_pool (bsc#1051510).
- soc/tegra: pmc: Fix child-node lookup (bsc#1051510).
- soc: ti: QMSS: Fix usage of irq_set_affinity_hint (bsc#1051510).
- sound: do not call skl_init_chip() to reset intel skl soc (bsc#1051510).
- sound: enable interrupt after dma buffer initialization (bsc#1051510).
- spi/bcm63xx-hsspi: keep pll clk enabled (bsc#1051510).
- spi: bcm-qspi: switch back to reading flash using smaller chunks (bsc#1051510).
- spi: sh-msiof: fix deferred probing (bsc#1051510).
- staging: comedi: ni_mio_common: protect register write overflow (bsc#1051510).
- staging:iio:ad7606: fix voltage scales (bsc#1051510).
- staging: rtl8723bs: Fix the return value in case of error in 'rtw_wx_read32()' (bsc#1051510).
- staging: vchiq_arm: fix compat VCHIQ_IOC_AWAIT_COMPLETION (bsc#1051510).
- sunrpc: Allow connect to return EHOSTUNREACH (git-fixes).
- sunrpc: Do not use stack buffer with scatterlist (git-fixes).
- sunrpc: Fix rpc_task_begin trace point (git-fixes).
- sunrpc: Fix tracepoint storage issues with svc_recv and svc_rqst_status (git-fixes).
- target: fix buffer offset in core_scsi3_pri_read_full_status (bsc1117349).
- target: log Data-Out timeouts as errors (bsc#1095805).
- target: log NOP ping timeouts as errors (bsc#1095805).
- target: split out helper for cxn timeout error stashing (bsc#1095805).
- target: stash sess_err_stats on Data-Out timeout (bsc#1095805).
- target: use ISCSI_IQN_LEN in iscsi_target_stat (bsc#1095805).
- tcp: do not restart timewait timer on rst reception (networking-stable-18_09_11).
- test_firmware: fix error return getting clobbered (bsc#1051510).
- tg3: Add PHY reset for 5717/5719/5720 in change ring and flow control paths (networking-stable-18_11_21).
- thermal: bcm2835: enable hwmon explicitly (bsc#1108468).
- thermal: da9062/61: Prevent hardware access during system suspend (bsc#1051510).
- thermal: rcar_thermal: Prevent hardware access during system suspend (bsc#1051510).
- tipc: do not assume linear buffer when reading ancillary data (networking-stable-18_11_21).
- tipc: fix a missing rhashtable_walk_exit() (networking-stable-18_09_11).
- tipc: fix flow control accounting for implicit connect (networking-stable-18_10_16).
- tools build: fix # escaping in .cmd files for future Make (git-fixes).
- tools/testing/nvdimm: advertise a write cache for nfit_test (bsc#1112128).
- tools/testing/nvdimm: allow custom error code injection (bsc#1112128).
- tools/testing/nvdimm: disable labels for nfit_test.1 (bsc#1112128).
- tools/testing/nvdimm: enable labels for nfit_test.1 dimms (bsc#1112128).
- tools/testing/nvdimm: fix missing newline in nfit_test_dimm 'handle' attribute (bsc#1112128).
- tools/testing/nvdimm: Fix support for emulating controller temperature (bsc#1112128).
- tools/testing/nvdimm: force nfit_test to depend on instrumented modules (bsc#1112128).
- tools/testing/nvdimm: improve emulation of smart injection (bsc#1112128).
- tools/testing/nvdimm: kaddr and pfn can be NULL to ->direct_access() (bsc#1112128).
- tools/testing/nvdimm: Make DSM failure code injection an override (bsc#1112128).
- tools/testing/nvdimm: smart alarm/threshold control (bsc#1112128).
- tools/testing/nvdimm: stricter bounds checking for error injection commands (bsc#1112128).
- tools/testing/nvdimm: support nfit_test_dimm attributes under nfit_test.1 (bsc#1112128).
- tools/testing/nvdimm: unit test clear-error commands (bsc#1112128).
- tools/vm/page-types.c: fix 'defined but not used' warning (bsc#1051510).
- tools/vm/slabinfo.c: fix sign-compare warning (bsc#1051510).
- tpm2-cmd: allow more attempts for selftest execution (bsc#1082555).
- tpm: add retry logic (bsc#1082555).
- tpm: consolidate the TPM startup code (bsc#1082555).
- tpm: do not suspend/resume if power stays on (bsc#1082555).
- tpm: fix intermittent failure with self tests (bsc#1082555).
- tpm: fix response size validation in tpm_get_random() (bsc#1082555).
- tpm: move endianness conversion of ordinals to tpm_input_header (bsc#1082555).
- tpm: move endianness conversion of TPM_TAG_RQU_COMMAND to tpm_input_header (bsc#1082555).
- tpm: move the delay_msec increment after sleep in tpm_transmit() (bsc#1082555).
- tpm: React correctly to RC_TESTING from TPM 2.0 self tests (bsc#1082555).
- tpm: replace msleep() with usleep_range() in TPM 1.2/2.0 generic drivers (bsc#1082555).
- tpm: Restore functionality to xen vtpm driver (bsc#1082555).
- tpm: self test failure should not cause suspend to fail (bsc#1082555).
- tpm: tpm-interface: fix tpm_transmit/_cmd kdoc (bsc#1082555).
- tpm: Trigger only missing TPM 2.0 self tests (bsc#1082555).
- tpm: Use dynamic delay to wait for TPM 2.0 self test result (bsc#1082555).
- tpm: use tpm2_pcr_read() in tpm2_do_selftest() (bsc#1082555).
- tpm: use tpm_buf functions in tpm2_pcr_read() (bsc#1082555).
- tracing: Add barrier to trace_printk() buffer nesting modification (bsc#1112219).
- tracing: Apply trace_clock changes to instance max buffer (bsc#1117188).
- tracing: Erase irqsoff trace with empty write (bsc#1117189).
- tty: check name length in tty_find_polling_driver() (bsc#1051510).
- tty: Do not block on IO when ldisc change is pending (bnc#1105428).
- tty: fix data race between tty_init_dev and flush of buf (bnc#1105428).
- tty: Hold tty_ldisc_lock() during tty_reopen() (bnc#1105428).
- tty/ldsem: Add lockdep asserts for ldisc_sem (bnc#1105428).
- tty/ldsem: Convert to regular lockdep annotations (bnc#1105428).
- tty/ldsem: Decrement wait_readers on timeouted down_read() (bnc#1105428).
- tty/ldsem: Wake up readers after timed out down_write() (bnc#1105428).
- tty: Simplify tty->count math in tty_reopen() (bnc#1105428).
- tty: wipe buffer (bsc#1051510).
- tty: wipe buffer if not echoing data (bsc#1051510).
- tun: Consistently configure generic netdev params via rtnetlink (bsc#1051510).
- tuntap: fix multiqueue rx (networking-stable-18_11_21).
- udp4: fix IP_CMSG_CHECKSUM for connected sockets (networking-stable-18_09_24).
- udp6: add missing checks on edumux packet processing (networking-stable-18_09_24).
- udp6: fix encap return code for resubmitting (git-fixes).
- uio: ensure class is registered before devices (bsc#1051510).
- uio: Fix an Oops on load (bsc#1051510).
- uio: make symbol 'uio_class_registered' static (bsc#1051510).
- Update config files. Enabled ENA (Amazon network driver) for arm64.
- usb: cdc-acm: add entry for Hiro (Conexant) modem (bsc#1051510).
- usb: chipidea: Prevent unbalanced IRQ disable (bsc#1051510).
- usb: core: Fix hub port connection events lost (bsc#1051510).
- usb: dwc2: host: do not delay retries for CONTROL IN transfers (bsc#1114385).
- usb: dwc2: host: Do not retry NAKed transactions right away (bsc#1114385).
- usb: dwc3: core: Clean up ULPI device (bsc#1051510).
- usb: dwc3: gadget: fix ISOC TRB type on unaligned transfers (bsc#1051510).
- usb: dwc3: gadget: Properly check last unaligned/zero chain TRB (bsc#1051510).
- usb: gadget: fsl_udc_core: check allocation return value and cleanup on failure (bsc#1051510).
- usb: gadget: fsl_udc_core: fixup struct_udc_setup documentation (bsc#1051510).
- usb: gadget: storage: Fix Spectre v1 vulnerability (bsc#1051510).
- usb: gadget: udc: atmel: handle at91sam9rl PMC (bsc#1051510).
- usb: gadget: u_ether: fix unsafe list iteration (bsc#1051510).
- usb: host: ohci-at91: fix request of irq for optional gpio (bsc#1051510).
- usbip: tools: fix atoi() on non-null terminated string (bsc#1051510).
- usbip:vudc: BUG kmalloc-2048 (Not tainted): Poison overwritten (bsc#1051510).
- usb: misc: appledisplay: add 20' Apple Cinema Display (bsc#1051510).
- usbnet: smsc95xx: disable carrier check while suspending (bsc#1051510).
- usb: omap_udc: fix rejection of out transfers when DMA is used (bsc#1051510).
- usb: quirks: Add delay-init quirk for Corsair K70 LUX RGB (bsc#1051510).
- usb: quirks: Add no-lpm quirk for Raydium touchscreens (bsc#1051510).
- usb: remove LPM management from usb_driver_claim_interface() (bsc#1051510).
- usb: serial: cypress_m8: fix interrupt-out transfer length (bsc#1051510).
- usb: serial: option: add two-endpoints device-id flag (bsc#1051510).
- usb: serial: option: drop redundant interface-class test (bsc#1051510).
- usb: serial: option: improve Quectel EP06 detection (bsc#1051510).
- usb: xhci: fix timeout for transition from RExit to U0 (bsc#1051510).
- userfaultfd: hugetlbfs: fix userfaultfd_huge_must_wait() pte access (bsc#1109739).
- Use upstream version of pci-hyperv patch (35a88a1)
- VFS: close race between getcwd() and d_move() (git-fixes).
- VFS: fix freeze protection in mnt_want_write_file() for overlayfs (git-fixes).
- vhost: Fix Spectre V1 vulnerability (bsc#1051510).
- vhost/scsi: truncate T10 PI iov_iter to prot_bytes (bsc#1051510).
- virtio_net: avoid using netif_tx_disable() for serializing tx routine (networking-stable-18_11_02).
- VMCI: Resource wildcard match fixed (bsc#1051510).
- w1: omap-hdq: fix missing bus unregister at removal (bsc#1051510).
- Workaround for mysterious NVMe breakage with i915 CFL (bsc#1111040).
- x86/acpi: Prevent X2APIC id 0xffffffff from being accounted (bsc#1110006).
- x86/boot/KASLR: Work around firmware bugs by excluding EFI_BOOT_SERVICES_* and EFI_LOADER_* from KASLR's choice (bnc#1112878).
- x86/boot: Move EISA setup to a separate file (bsc#1110006).
- x86/corruption-check: Fix panic in memory_corruption_check() when boot option without value is provided (bsc#1110006).
- x86/cpufeature: Add User-Mode Instruction Prevention definitions (bsc#1110006).
- x86/cpufeatures: Add Intel Total Memory Encryption cpufeature (bsc#1110006).
- x86/cpu/vmware: Do not trace vmware_sched_clock() (bsc#1114279).
- x86/eisa: Add missing include (bsc#1110006).
- x86/EISA: Do not probe EISA bus for Xen PV guests (bsc#1110006).
- x86/fpu: Remove second definition of fpu in __fpu__restore_sig() (bsc#1110006).
- x86, hibernate: Fix nosave_regions setup for hibernation (bsc#1110006).
- x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772).
- x86/kasan: Panic if there is not enough memory to boot (bsc#1110006).
- x86/kexec: Correct KEXEC_BACKUP_SRC_END off-by-one error (bsc#1114279).
- x86/ldt: Remove unused variable in map_ldt_struct() (bsc#1114279).
- x86/ldt: Split out sanity check in map_ldt_struct() (bsc#1114279).
- x86/ldt: Unmap PTEs for the slot before freeing LDT pages (bsc#1114279).
- x86/MCE/AMD: Fix the thresholding machinery initialization order (bsc#1114279).
- x86/MCE: Fix stack out-of-bounds write in mce-inject.c: Flags_read() (bsc#1110006).
- x86/MCE: Make correctable error detection look at the Deferred bit (bsc#1114279).
- x86/mm/pat: Disable preemption around __flush_tlb_all() (bsc#1114279).
- x86, nfit_test: Add unit test for memcpy_mcsafe() (bsc#1112128).
- x86/paravirt: Fix some warning messages (bnc#1065600).
- x86/percpu: Fix this_cpu_read() (bsc#1110006).
- x86/speculation: Support Enhanced IBRS on future CPUs ().
- x86/time: Correct the attribute on jiffies' definition (bsc#1110006).
- x86/xen: Fix boot loader version reported for PVH guests (bnc#1065600).
- xen/balloon: Support xend-based toolstack (bnc#1065600).
- xen/blkfront: avoid NULL blkfront_info dereference on device removal (bsc#1111062).
- xen: fix race in xen_qlock_wait() (bnc#1107256).
- xen: fix xen_qlock_wait() (bnc#1107256).
- xen/gntdev: avoid out of bounds access in case of partial gntdev_mmap() (bnc#1065600).
- xen: make xen_qlock_wait() nestable (bnc#1107256).
- xen/netfront: do not bug in case of too many frags (bnc#1104824).
- xen/pvh: do not try to unplug emulated devices (bnc#1065600).
- xen/pvh: increase early stack size (bnc#1065600).
- xen: Remove unnecessary BUG_ON from __unbind_from_irq() (bnc#1065600).
- xen-swiotlb: fix the check condition for xen_swiotlb_free_coherent (bnc#1065600).
- xen-swiotlb: use actually allocated size on check physical continuous (bnc#1065600).
- xen/x86: add diagnostic printout to xen_mc_flush() in case of error (bnc#1116183).
- xfrm: use complete IPv6 addresses for hash (bsc#1109330).
- xfs: do not fail when converting shortform attr to long form during ATTR_REPLACE (bsc#1105025).
- xfs: Fix error code in 'xfs_ioc_getbmap()' (git-fixes).
- xfs: Properly detect when DAX won't be used on any device (bsc#1115976).
- xhci: Add check for invalid byte size error when UAS devices are connected (bsc#1051510).
- xhci: Do not print a warning when setting link state for disabled ports (bsc#1051510).
- xhci: Fix leaking USB3 shared_hcd at xhci removal (bsc#1051510).
- xprtrdma: Do not defer fencing an async RPC's chunks (git-fixes).
Patchnames
SUSE-SLE-Live-Patching-12-SP4-2018-2894
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).\n- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removed entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry could remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).\n- CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).\n- CVE-2018-18445: Faulty computation of numeric bounds in the BPF verifier permitted out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandled 32-bit right shifts (bnc#1112372).\n- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).\n- CVE-2017-18224: fs/ocfs2/aops.c omitted use of a semaphore and consequently had a race condition for access to the extent tree during read operations in DIRECT mode, which allowed local users to cause a denial of service (BUG) by modifying a certain e_cpos field (bnc#1084831).\n- CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674).\n\nThe following non-security bugs were fixed:\n\n- ACPI/APEI: Handle GSIV and GPIO notification types (bsc#1115567).\n- ACPICA: Tables: Add WSMT support (bsc#1089350).\n- ACPI/IORT: Fix iort_get_platform_device_domain() uninitialized pointer value (bsc#1051510).\n- ACPI / LPSS: Add alternative ACPI HIDs for Cherry Trail DMA controllers (bsc#1051510).\n- ACPI, nfit: Fix ARS overflow continuation (bsc#1116895).\n- ACPI, nfit: Prefer _DSM over _LSR for namespace label reads (bsc#1112128).\n- ACPI/nfit, x86/mce: Handle only uncorrectable machine checks (bsc#1114279).\n- ACPI/nfit, x86/mce: Validate a MCE's address before using it (bsc#1114279).\n- ACPI / platform: Add SMB0001 HID to forbidden_id_list (bsc#1051510).\n- ACPI / processor: Fix the return value of acpi_processor_ids_walk() (bsc#1051510).\n- ACPI / watchdog: Prefer iTCO_wdt always when WDAT table uses RTC SRAM (bsc#1051510).\n- act_ife: fix a potential use-after-free (networking-stable-18_09_11).\n- Add the cherry-picked dup id for PCI dwc fix\n- Add version information to KLP_SYMBOLS file\n- ALSA: ac97: Fix incorrect bit shift at AC97-SPSA control write (bsc#1051510).\n- ALSA: ca0106: Disable IZD on SB0570 DAC to fix audio pops (bsc#1051510).\n- ALSA: control: Fix race between adding and removing a user element (bsc#1051510).\n- ALSA: hda: Add 2 more models to the power_save blacklist (bsc#1051510).\n- ALSA: hda: Add ASRock N68C-S UCC the power_save blacklist (bsc#1051510).\n- ALSA: hda - Add mic quirk for the Lenovo G50-30 (17aa:3905) (bsc#1051510).\n- ALSA: hda - Add quirk for ASUS G751 laptop (bsc#1051510).\n- ALSA: hda/ca0132 - Call pci_iounmap() instead of iounmap() (bsc#1051510).\n- ALSA: hda - Fix headphone pin config for ASUS G751 (bsc#1051510).\n- ALSA: hda: fix unused variable warning (bsc#1051510).\n- ALSA: hda/realtek - Add auto-mute quirk for HP Spectre x360 laptop (bsc#1051510).\n- ALSA: hda/realtek - Add GPIO data update helper (bsc#1051510).\n- ALSA: hda/realtek - Allow skipping spec->init_amp detection (bsc#1051510).\n- ALSA: hda/realtek - fix headset mic detection for MSI MS-B171 (bsc#1051510).\n- ALSA: hda/realtek - Fix HP Headset Mic can't record (bsc#1051510).\n- ALSA: hda/realtek - fix the pop noise on headphone for lenovo laptops (bsc#1051510).\n- ALSA: hda/realtek - Fix the problem of the front MIC on the Lenovo M715 (bsc#1051510).\n- ALSA: hda/realtek - Manage GPIO bits commonly (bsc#1051510).\n- ALSA: hda/realtek - Simplify Dell XPS13 GPIO handling (bsc#1051510).\n- ALSA: hda/realtek - Support ALC300 (bsc#1051510).\n- ALSA: oss: Use kvzalloc() for local buffer allocations (bsc#1051510).\n- ALSA: sparc: Fix invalid snd_free_pages() at error path (bsc#1051510).\n- ALSA: usb-audio: Add vendor and product name for Dell WD19 Dock (bsc#1051510).\n- ALSA: usb-audio: update quirk for B&W PX to remove microphone (bsc#1051510).\n- ALSA: wss: Fix invalid snd_free_pages() at error path (bsc#1051510).\n- amd/iommu: Fix Guest Virtual APIC Log Tail Address Register (bsc#1106105).\n- arm64: KVM: Move CPU ID reg trap setup off the world switch path (bsc#1110998).\n- arm64: KVM: Sanitize PSTATE.M when being set from userspace (bsc#1110998).\n- arm64: KVM: Tighten guest core register access from userspace (bsc#1110998).\n- ARM: dts: at91: add new compatibility string for macb on sama5d3 (bsc#1051510).\n- ASoC: dwc: Added a quirk DW_I2S_QUIRK_16BIT_IDX_OVERRIDE to dwc (bsc#1085535)\n- ASoC: Intel: cht_bsw_max98090: add support for Baytrail (bsc#1051510).\n- ASoC: intel: cht_bsw_max98090_ti: Add quirk for boards using pmc_plt_clk_0 (bsc#1051510).\n- ASoC: intel: skylake: Add missing break in skl_tplg_get_token() (bsc#1051510).\n- ASoC: Intel: Skylake: Reset the controller in probe (bsc#1051510).\n- ASoC: rsnd: adg: care clock-frequency size (bsc#1051510).\n- ASoC: rsnd: do not fallback to PIO mode when -EPROBE_DEFER (bsc#1051510).\n- ASoC: rt5514: Fix the issue of the delay volume applied again (bsc#1051510).\n- ASoC: sigmadsp: safeload should not have lower byte limit (bsc#1051510).\n- ASoC: sun8i-codec: fix crash on module removal (bsc#1051510).\n- ASoC: wm8804: Add ACPI support (bsc#1051510).\n- ata: Fix racy link clearance (bsc#1107866).\n- ataflop: fix error handling during setup (bsc#1051510).\n- ath10k: fix kernel panic issue during pci probe (bsc#1051510).\n- ath10k: fix scan crash due to incorrect length calculation (bsc#1051510).\n- ath10k: fix use-after-free in ath10k_wmi_cmd_send_nowait (bsc#1051510).\n- ath10k: schedule hardware restart if WMI command times out (bsc#1051510).\n- autofs: fix autofs_sbi() does not check super block type (git-fixes).\n- autofs: fix slab out of bounds read in getname_kernel() (git-fixes).\n- autofs: mount point create should honour passed in mode (git-fixes).\n- badblocks: fix wrong return value in badblocks_set if badblocks are disabled (git-fixes).\n- batman-adv: Avoid probe ELP information leak (bsc#1051510).\n- batman-adv: Expand merged fragment buffer for full packet (bsc#1051510).\n- batman-adv: fix backbone_gw refcount on queue_work() failure (bsc#1051510).\n- batman-adv: fix hardif_neigh refcount on queue_work() failure (bsc#1051510).\n- batman-adv: Use explicit tvlv padding for ELP packets (bsc#1051510).\n- bdi: Fix another oops in wb_workfn() (bsc#1112746).\n- bdi: Preserve kabi when adding cgwb_release_mutex (bsc#1112746).\n- bitops: protect variables in bit_clear_unless() macro (bsc#1051510).\n- bitops: protect variables in set_mask_bits() macro (bsc#1051510).\n- Blacklist commit that modifies Scsi_Host/kabi (bsc#1114579)\n- Blacklist sd_zbc patch that is too invasive (bsc#1114583)\n- Blacklist virtio patch that uses bio_integrity_bytes() (bsc#1114585)\n- blk-mq: I/O and timer unplugs are inverted in blktrace (bsc#1112713).\n- block, bfq: fix wrong init of saved start time for weight raising (bsc#1112708).\n- block: bfq: swap puts in bfqg_and_blkg_put (bsc#1112712).\n- block: copy ioprio in __bio_clone_fast() (bsc#1082653).\n- block: respect virtual boundary mask in bvecs (bsc#1113412).\n- Bluetooth: btbcm: Add entry for BCM4335C0 UART bluetooth (bsc#1051510).\n- Bluetooth: SMP: fix crash in unpairing (bsc#1051510).\n- bnxt_en: Fix TX timeout during netpoll (networking-stable-18_10_16).\n- bnxt_en: free hwrm resources, if driver probe fails (networking-stable-18_10_16).\n- bonding: avoid possible dead-lock (networking-stable-18_10_16).\n- bonding: fix length of actor system (networking-stable-18_11_02).\n- bonding: fix warning message (networking-stable-18_10_16).\n- bonding: pass link-local packets to bonding master also (networking-stable-18_10_16).\n- bpf: fix partial copy of map_ptr when dst is scalar (bsc#1083647).\n- bpf, net: add skb_mac_header_len helper (networking-stable-18_09_24).\n- bpf/verifier: disallow pointer subtraction (bsc#1083647).\n- bpf: wait for running BPF programs when updating map-in-map (bsc#1083647).\n- brcmfmac: fix for proper support of 160MHz bandwidth (bsc#1051510).\n- brcmfmac: fix reporting support for 160 MHz channels (bsc#1051510).\n- brcmutil: really fix decoding channel info for 160 MHz bandwidth (bsc#1051510).\n- bridge: do not add port to router list when receives query with source 0.0.0.0 (networking-stable-18_11_02).\n- Btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667).\n- Btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).\n- Btrfs: fix assertion failure during fsync in no-holes mode (bsc#1118136).\n- Btrfs: fix assertion on fsync of regular file when using no-holes feature (bsc#1118137).\n- Btrfs: fix cur_offset in the error case for nocow (bsc#1118140).\n- Btrfs: fix data corruption due to cloning of eof block (bsc#1116878).\n- Btrfs: fix deadlock on tree root leaf when finding free extent (bsc#1116876).\n- Btrfs: fix deadlock when writing out free space caches (bsc#1116700).\n- Btrfs: fix infinite loop on inode eviction after deduplication of eof block (bsc#1116877).\n- Btrfs: fix missing error return in btrfs_drop_snapshot (Git-fixes bsc#1109919).\n- Btrfs: fix null pointer dereference on compressed write path error (bsc#1116698).\n- Btrfs: fix use-after-free during inode eviction (bsc#1116701).\n- Btrfs: fix use-after-free when dumping free space (bsc#1116862).\n- Btrfs: fix warning when replaying log after fsync of a tmpfile (bsc#1116692).\n- Btrfs: fix wrong dentries after fsync of file that got its parent replaced (bsc#1116693).\n- Btrfs: handle errors while updating refcounts in update_ref_for_cow (Git-fixes bsc#1109915).\n- Btrfs: make sure we create all new block groups (bsc#1116699).\n- Btrfs: protect space cache inode alloc with GFP_NOFS (bsc#1116863).\n- Btrfs: send, fix infinite loop due to directory rename dependencies (bsc#1118138).\n- cachefiles: fix the race between cachefiles_bury_object() and rmdir(2) (bsc#1051510).\n- can: dev: __can_get_echo_skb(): Do not crash the kernel if can_priv::echo_skb is accessed out of bounds (bsc#1051510).\n- can: dev: can_get_echo_skb(): factor out non sending code to __can_get_echo_skb() (bsc#1051510).\n- can: dev: __can_get_echo_skb(): print error message, if trying to echo non existing skb (bsc#1051510).\n- can: dev: __can_get_echo_skb(): replace struct can_frame by canfd_frame to access frame length (bsc#1051510).\n- can: hi311x: Use level-triggered interrupt (bsc#1051510).\n- can: raw: check for CAN FD capable netdev in raw_sendmsg() (bsc#1051510).\n- can: rcar_can: Fix erroneous registration (bsc#1051510).\n- can: rx-offload: introduce can_rx_offload_get_echo_skb() and can_rx_offload_queue_sorted() functions (bsc#1051510).\n- cdc-acm: correct counting of UART states in serial state notification (bsc#1051510).\n- cdc-acm: do not reset notification buffer index upon urb unlinking (bsc#1051510).\n- cdc-acm: fix race between reset and control messaging (bsc#1051510).\n- ceph: avoid a use-after-free in ceph_destroy_options() (bsc#1111983).\n- ceph: fix dentry leak in ceph_readdir_prepopulate (bsc#1114839).\n- ceph: quota: fix null pointer dereference in quota check (bsc#1114839).\n- cfg80211: Address some corner cases in scan result channel updating (bsc#1051510).\n- cfg80211: fix use-after-free in reg_process_hint() (bsc#1051510).\n- cifs: check for STATUS_USER_SESSION_DELETED (bsc#1112902).\n- cifs: fix memory leak in SMB2_open() (bsc#1112894).\n- cifs: Fix use after free of a mid_q_entry (bsc#1112903).\n- clk: at91: Fix division by zero in PLL recalc_rate() (bsc#1051510).\n- clk: fixed-factor: fix of_node_get-put imbalance (bsc#1051510).\n- clk: fixed-rate: fix of_node_get-put imbalance (bsc#1051510).\n- clk: mmp2: fix the clock id for sdh2_clk and sdh3_clk (bsc#1051510).\n- clk: rockchip: Fix static checker warning in rockchip_ddrclk_get_parent call (bsc#1051510).\n- clk: s2mps11: Add used attribute to s2mps11_dt_match (bsc#1051510).\n- clk: s2mps11: Fix matching when built as module and DT node contains compatible (bsc#1051510).\n- clk: samsung: exynos5420: Enable PERIS clocks for suspend (bsc#1051510).\n- clk: x86: add 'ether_clk' alias for Bay Trail / Cherry Trail (bsc#1051510).\n- clk: x86: Stop marking clocks as CLK_IS_CRITICAL (bsc#1051510).\n- clockevents/drivers/i8253: Add support for PIT shutdown quirk (bsc#1051510).\n- clocksource/drivers/ti-32k: Add CLOCK_SOURCE_SUSPEND_NONSTOP flag for non-am43 SoCs (bsc#1051510).\n- clocksource/drivers/timer-atmel-pit: Properly handle error cases (bsc#1051510).\n- coda: fix 'kernel memory exposure attempt' in fsync (bsc#1051510).\n- configfs: replace strncpy with memcpy (bsc#1051510).\n- crypto: caam - fix implicit casts in endianness helpers (bsc#1051510).\n- crypto: chelsio - Fix memory corruption in DMA Mapped buffers (bsc#1051510).\n- crypto: lrw - Fix out-of bounds access on counter overflow (bsc#1051510).\n- crypto: simd - correctly take reqsize of wrapped skcipher into account (bsc#1051510).\n- crypto: tcrypt - fix ghash-generic speed test (bsc#1051510).\n- dax: Fix deadlock in dax_lock_mapping_entry() (bsc#1109951).\n- debugobjects: Make stack check warning more informative (bsc#1051510).\n- Documentation/l1tf: Fix small spelling typo (bsc#1051510).\n- Documentation/l1tf: Fix typos (bsc#1051510).\n- Documentation/l1tf: Remove Yonah processors from not vulnerable list (bsc#1051510).\n- do d_instantiate/unlock_new_inode combinations safely (git-fixes).\n- Do not leak MNT_INTERNAL away from internal mounts (git-fixes).\n- driver/dma/ioat: Call del_timer_sync() without holding prep_lock (bsc#1051510).\n- drm/amdgpu: add missing CHIP_HAINAN in amdgpu_ucode_get_load_type (bsc#1051510).\n- drm/amdgpu: Fix SDMA HQD destroy error on gfx_v7 (bsc#1051510).\n- drm/amdgpu: Fix vce work queue was not cancelled when suspend (bsc#1106110)\n- drm/amdgpu/powerplay: fix missing break in switch statements (bsc#1113722)\n- drm/ast: change resolution may cause screen blurred (boo#1112963).\n- drm/ast: fixed cursor may disappear sometimes (bsc#1051510).\n- drm/ast: Fix incorrect free on ioregs (bsc#1051510).\n- drm/ast: Remove existing framebuffers before loading driver (boo#1112963)\n- drm/dp_mst: Check if primary mstb is null (bsc#1051510).\n- drm/dp_mst: Skip validating ports during destruction, just ref (bsc#1051510).\n- drm/edid: Add 6 bpc quirk for BOE panel (bsc#1051510).\n- drm/edid: Add 6 bpc quirk for BOE panel in HP Pavilion 15-n233sl (bsc#1113722)\n- drm/edid: VSDB yCBCr420 Deep Color mode bit definitions (bsc#1051510).\n- drm: fb-helper: Reject all pixel format changing requests (bsc#1113722)\n- drm/hisilicon: hibmc: Do not carry error code in HiBMC framebuffer (bsc#1113722)\n- drm/hisilicon: hibmc: Do not overwrite fb helper surface depth (bsc#1113722)\n- drm/i915/audio: Hook up component bindings even if displays are (bsc#1113722)\n- drm/i915: Do not oops during modeset shutdown after lpe audio deinit (bsc#1051510).\n- drm/i915: Do not unset intel_connector->mst_port (bsc#1051510).\n- drm/i915/dp: Link train Fallback on eDP only if fallback link BW can fit panel's native mode (bsc#1051510).\n- drm/i915/execlists: Force write serialisation into context image vs execution (bsc#1051510).\n- drm/i915: Fix ilk+ watermarks when disabling pipes (bsc#1051510).\n- drm/i915/gen9+: Fix initial readout for Y tiled framebuffers (bsc#1113722)\n- drm/i915/glk: Add Quirk for GLK NUC HDMI port issues (bsc#1051510).\n- drm/i915/glk: Remove 99% limitation (bsc#1051510).\n- drm/i915/hdmi: Add HDMI 2.0 audio clock recovery N values (bsc#1051510).\n- drm/i915: Large page offsets for pread/pwrite (bsc#1051510).\n- drm/i915: Mark pin flags as u64 (bsc#1051510).\n- drm/i915: Restore vblank interrupts earlier (bsc#1051510).\n- drm/i915: Skip vcpi allocation for MSTB ports that are gone (bsc#1051510).\n- drm/i915: Write GPU relocs harder with gen3 (bsc#1051510).\n- drm: mali-dp: Call drm_crtc_vblank_reset on device init (bsc#1051510).\n- drm/mediatek: fix OF sibling-node lookup (bsc#1106110)\n- drm/meson: add support for 1080p25 mode (bsc#1051510).\n- drm/meson: Enable fast_io in meson_dw_hdmi_regmap_config (bsc#1051510).\n- drm/meson: Fix OOB memory accesses in meson_viu_set_osd_lut() (bsc#1051510).\n- drm/msm: fix OF child-node lookup (bsc#1106110)\n- drm/nouveau: Check backlight IDs are >= 0, not > 0 (bsc#1051510).\n- drm/nouveau: Do not disable polling in fallback mode (bsc#1103356).\n- drm/omap: fix memory barrier bug in DMM driver (bsc#1051510).\n- drm/rockchip: Allow driver to be shutdown on reboot/kexec (bsc#1051510).\n- drm/sti: do not remove the drm_bridge that was never added (bsc#1100132)\n- drm/sun4i: Fix an ulong overflow in the dotclock driver (bsc#1106110)\n- drm/virtio: fix bounds check in virtio_gpu_cmd_get_capset() (bsc#1113722)\n- e1000: check on netif_running() before calling e1000_up() (bsc#1051510).\n- e1000: ensure to free old tx/rx rings in set_ringparam() (bsc#1051510).\n- EDAC, {i7core,sb,skx}_edac: Fix uncorrected error counting (bsc#1114279).\n- EDAC: Raise the maximum number of memory controllers (bsc#1113780).\n- EDAC, skx_edac: Fix logical channel intermediate decoding (bsc#1114279).\n- EDAC, thunderx: Fix memory leak in thunderx_l2c_threaded_isr() (bsc#1114279).\n- eeprom: at24: change nvmem stride to 1 (bsc#1051510).\n- eeprom: at24: check at24_read/write arguments (bsc#1051510).\n- eeprom: at24: correctly set the size for at24mac402 (bsc#1051510).\n- Enable LSPCON instead of blindly disabling HDMI\n- enic: do not call enic_change_mtu in enic_probe (bsc#1051510).\n- enic: handle mtu change for vf properly (bsc#1051510).\n- enic: initialize enic->rfs_h.lock in enic_probe (bsc#1051510).\n- ethtool: fix a privilege escalation bug (bsc#1076830).\n- ext2, dax: set ext2_dax_aops for dax files (bsc#1112554).\n- ext4: add missing brelse() add_new_gdb_meta_bg()'s error path (bsc#1117795).\n- ext4: add missing brelse() in set_flexbg_block_bitmap()'s error path (bsc#1117794).\n- ext4: add missing brelse() update_backups()'s error path (bsc#1117796).\n- ext4: avoid arithemetic overflow that can trigger a BUG (bsc#1112736).\n- ext4: avoid buffer leak in ext4_orphan_add() after prior errors (bsc#1117802).\n- ext4: avoid buffer leak on shutdown in ext4_mark_iloc_dirty() (bsc#1117801).\n- ext4: avoid divide by zero fault when deleting corrupted inline directories (bsc#1112735).\n- ext4: avoid potential extra brelse in setup_new_flex_group_blocks() (bsc#1117792).\n- ext4: check for NUL characters in extended attribute's name (bsc#1112732).\n- ext4: check to make sure the rename(2)'s destination is not freed (bsc#1112734).\n- ext4: do not mark mmp buffer head dirty (bsc#1112743).\n- ext4: fix buffer leak in __ext4_read_dirblock() on error path (bsc#1117807).\n- ext4: fix buffer leak in ext4_xattr_move_to_block() on error path (bsc#1117806).\n- ext4: fix missing cleanup if ext4_alloc_flex_bg_array() fails while resizing (bsc#1117798).\n- ext4: fix online resize's handling of a too-small final block group (bsc#1112739).\n- ext4: fix online resizing for bigalloc file systems with a 1k block size (bsc#1112740).\n- ext4: fix possible inode leak in the retry loop of ext4_resize_fs() (bsc#1117799).\n- ext4: fix possible leak of sbi->s_group_desc_leak in error path (bsc#1117803).\n- ext4: fix possible leak of s_journal_flag_rwsem in error path (bsc#1117804).\n- ext4: fix setattr project check in fssetxattr ioctl (bsc#1117789).\n- ext4: fix spectre gadget in ext4_mb_regular_allocator() (bsc#1112733).\n- ext4: fix use-after-free race in ext4_remount()'s error path (bsc#1117791).\n- ext4: initialize retries variable in ext4_da_write_inline_data_begin() (bsc#1117788).\n- ext4: propagate error from dquot_initialize() in EXT4_IOC_FSSETXATTR (bsc#1117790).\n- ext4: recalucate superblock checksum after updating free blocks/inodes (bsc#1112738).\n- ext4: release bs.bh before re-using in ext4_xattr_block_find() (bsc#1117805).\n- ext4: reset error code in ext4_find_entry in fallback (bsc#1112731).\n- ext4: show test_dummy_encryption mount option in /proc/mounts (bsc#1112741).\n- fbdev: fix broken menu dependencies (bsc#1113722)\n- fbdev/omapfb: fix omapfb_memory_read infoleak (bsc#1051510).\n- firmware: dcdbas: Add support for WSMT ACPI table (bsc#1089350 ).\n- firmware: dcdbas: include linux/io.h (bsc#1089350).\n- Fix kABI for 'Ensure we commit after writeback is complete' (bsc#1111809).\n- floppy: fix race condition in __floppy_read_block_0() (bsc#1051510).\n- flow_dissector: do not dissect l4 ports for fragments (networking-stable-18_11_21).\n- fscache: fix race between enablement and dropping of object (bsc#1107385).\n- fs: dcache: Avoid livelock between d_alloc_parallel and __d_add (git-fixes).\n- fs/dcache.c: fix kmemcheck splat at take_dentry_name_snapshot() (git-fixes).\n- fs: dcache: Use READ_ONCE when accessing i_dir_seq (git-fixes).\n- fs: Make extension of struct super_block transparent (bsc#1117822).\n- fsnotify: Fix busy inodes during unmount (bsc#1117822).\n- fsnotify: fix ignore mask logic in fsnotify() (bsc#1115074).\n- fs/quota: Fix spectre gadget in do_quotactl (bsc#1112745).\n- ftrace: Fix debug preempt config name in stack_tracer_{en,dis}able (bsc#1117172).\n- ftrace: Fix kmemleak in unregister_ftrace_graph (bsc#1117181).\n- ftrace: Fix memleak when unregistering dynamic ops when tracing disabled (bsc#1117174).\n- ftrace: Remove incorrect setting of glob search field (bsc#1117184).\n- genirq: Fix race on spurious interrupt detection (bsc#1051510).\n- getname_kernel() needs to make sure that ->name != ->iname in long case (git-fixes).\n- gpio: do not free unallocated ida on gpiochip_add_data_with_key() error path (bsc#1051510).\n- grace: replace BUG_ON by WARN_ONCE in exit_net hook (git-fixes).\n- gso_segment: Reset skb->mac_len after modifying network header (networking-stable-18_09_24).\n- hfsplus: do not return 0 when fill_super() failed (bsc#1051510).\n- hfsplus: stop workqueue when fill_super() failed (bsc#1051510).\n- hfs: prevent crash on exit from failed search (bsc#1051510).\n- HID: hiddev: fix potential Spectre v1 (bsc#1051510).\n- HID: hid-sensor-hub: Force logical minimum to 1 for power and report state (bsc#1051510).\n- HID: quirks: fix support for Apple Magic Keyboards (bsc#1051510).\n- HID: sensor-hub: Restore fixup for Lenovo ThinkPad Helix 2 sensor hub report (bsc#1051510).\n- HID: uhid: forbid UHID_CREATE under KERNEL_DS or elevated privileges (bsc#1051510).\n- hv: avoid crash in vmbus sysfs files (bnc#1108377).\n- hv_netvsc: fix schedule in RCU context ().\n- hv_netvsc: ignore devices that are not PCI (networking-stable-18_09_11).\n- hwmon: (core) Fix double-free in __hwmon_device_register() (bsc#1051510).\n- hwmon: (ibmpowernv) Remove bogus __init annotations (bsc#1051510).\n- hwmon: (ina2xx) Fix current value calculation (bsc#1051510).\n- hwmon (ina2xx) Fix NULL id pointer in probe() (bsc#1051510).\n- hwmon: (nct6775) Fix potential Spectre v1 (bsc#1051510).\n- hwmon: (pmbus) Fix page count auto-detection (bsc#1051510).\n- hwmon: (pwm-fan) Set fan speed to 0 on suspend (bsc#1051510).\n- hwmon: (raspberrypi) Fix initial notify (bsc#1051510).\n- hwmon: (w83795) temp4_type has writable permission (bsc#1051510).\n- hwrng: core - document the quality field (bsc#1051510).\n- hypfs_kill_super(): deal with failed allocations (bsc#1051510).\n- i2c: i2c-scmi: fix for i2c_smbus_write_block_data (bsc#1051510).\n- i2c: rcar: cleanup DMA for all kinds of failure (bsc#1051510).\n- ibmvnic: fix accelerated VLAN handling ().\n- ibmvnic: fix index in release_rx_pools (bsc#1115440, bsc#1115433).\n- ibmvnic: remove ndo_poll_controller ().\n- ibmvnic: Update driver queues after change in ring size support ().\n- iio: accel: adxl345: convert address field usage in iio_chan_spec (bsc#1051510).\n- iio: ad5064: Fix regulator handling (bsc#1051510).\n- iio: adc: at91: fix acking DRDY irq on simple conversions (bsc#1051510).\n- iio: adc: at91: fix wrong channel number in triggered buffer mode (bsc#1051510).\n- iio: adc: imx25-gcq: Fix leak of device_node in mx25_gcq_setup_cfgs() (bsc#1051510).\n- iio:st_magn: Fix enable device after trigger (bsc#1051510).\n- ima: fix showing large 'violations' or 'runtime_measurements_count' (bsc#1051510).\n- include/linux/pfn_t.h: force '~' to be parsed as an unary operator (bsc#1051510).\n- inet: make sure to grab rcu_read_lock before using ireq->ireq_opt (networking-stable-18_10_16).\n- Input: atakbd - fix Atari CapsLock behaviour (bsc#1051510).\n- Input: atakbd - fix Atari keymap (bsc#1051510).\n- Input: elan_i2c - add ACPI ID for Lenovo IdeaPad 330-15IGM (bsc#1051510).\n- Input: synaptics - avoid using uninitialized variable when probing (bsc#1051510).\n- Input: xpad - add PDP device id 0x02a4 (bsc#1051510).\n- Input: xpad - add support for Xbox1 PDP Camo series gamepad (bsc#1051510).\n- Input: xpad - avoid using __set_bit() for capabilities (bsc#1051510).\n- Input: xpad - fix some coding style issues (bsc#1051510).\n- intel_th: pci: Add Ice Lake PCH support (bsc#1051510).\n- iommu/arm-smmu: Ensure that page-table updates are visible before TLBI (bsc#1106237).\n- iommu/arm-smmu: Error out only if not enough context interrupts (bsc#1106237).\n- iommu/ipmmu-vmsa: Fix crash on early domain free (bsc#1106105).\n- iommu/vt-d: Add definitions for PFSID (bsc#1106237).\n- iommu/vt-d: Fix dev iotlb pfsid use (bsc#1106237).\n- iommu/vt-d: Fix NULL pointer dereference in prq_event_thread() (bsc#1106105).\n- iommu/vt-d: Fix scatterlist offset handling (bsc#1106237).\n- iommu/vt-d: Use memunmap to free memremap (bsc#1106105).\n- ip6_tunnel: be careful when accessing the inner header (networking-stable-18_10_16).\n- ip6_tunnel: Fix encapsulation layout (networking-stable-18_11_02).\n- ip6_vti: fix a null pointer deference when destroy vti6 tunnel (networking-stable-18_09_11).\n- ipmi: Fix timer race with module unload (bsc#1051510).\n- ip_tunnel: be careful when accessing the inner header (networking-stable-18_10_16).\n- ip_tunnel: do not force DF when MTU is locked (networking-stable-18_11_21).\n- ipv4: lock mtu in fnhe when received PMTU < net.ipv4.route.min_pmtu (networking-stable-18_11_21).\n- ipv4: tcp: send zero IPID for RST and ACK sent in SYN-RECV and TIME-WAIT state (networking-stable-18_09_11).\n- ipv6: Fix PMTU updates for UDP/raw sockets in presence of VRF (networking-stable-18_11_21).\n- ipv6: fix possible use-after-free in ip6_xmit() (networking-stable-18_09_24).\n- ipv6: mcast: fix a use-after-free in inet6_mc_check (networking-stable-18_11_02).\n- ipv6/ndisc: Preserve IPv6 control buffer if protocol error handlers are called (networking-stable-18_11_02).\n- ipv6: take rcu lock in rawv6_send_hdrinc() (networking-stable-18_10_16).\n- iwlwifi: dbg: allow wrt collection before ALIVE (bsc#1051510).\n- iwlwifi: dbg: do not crash if the firmware crashes in the middle of a debug dump (bsc#1051510).\n- iwlwifi: do not WARN on trying to dump dead firmware (bsc#1051510).\n- iwlwifi: mvm: Allow TKIP for AP mode (bsc#1051510).\n- iwlwifi: mvm: check for n_profiles validity in EWRD ACPI (bsc#1051510).\n- iwlwifi: mvm: check for short GI only for OFDM (bsc#1051510).\n- iwlwifi: mvm: check return value of rs_rate_from_ucode_rate() (bsc#1051510).\n- iwlwifi: mvm: clear HW_RESTART_REQUESTED when stopping the interface (bsc#1051510).\n- iwlwifi: mvm: do not use SAR Geo if basic SAR is not used (bsc#1051510).\n- iwlwifi: mvm: fix BAR seq ctrl reporting (bsc#1051510).\n- iwlwifi: mvm: fix regulatory domain update when the firmware starts (bsc#1051510).\n- iwlwifi: mvm: open BA session only when sta is authorized (bsc#1051510).\n- iwlwifi: mvm: send BCAST management frames to the right station (bsc#1051510).\n- iwlwifi: mvm: support sta_statistics() even on older firmware (bsc#1051510).\n- iwlwifi: pcie: avoid empty free RB queue (bsc#1051510).\n- iwlwifi: pcie: gen2: build A-MSDU only for GSO (bsc#1051510).\n- iwlwifi: pcie gen2: check iwl_pcie_gen2_set_tb() return value (bsc#1051510).\n- jbd2: fix use after free in jbd2_log_do_checkpoint() (bsc#1113257).\n- KABI fix for 'NFSv4.1: Fix up replays of interrupted requests' (git-fixes).\n- kABI: Hide get_msr_feature() in kvm_x86_ops (bsc#1106240).\n- KABI: hide new member in struct iommu_table from genksyms (bsc#1061840).\n- KABI: mask raw in struct bpf_reg_state (bsc#1083647).\n- KABI: powerpc: export __find_linux_pte as __find_linux_pte_or_hugepte (bsc#1061840).\n- KABI: powerpc: Revert npu callback signature change (bsc#1055120).\n- KABI: protect struct fib_nh_exception (kabi).\n- KABI: protect struct rtable (kabi).\n- KABI/severities: ignore __xive_vm_h_* KVM internal symbols.\n- Kbuild: fix # escaping in .cmd files for future Make (git-fixes).\n- kbuild: fix kernel/bounds.c 'W=1' warning (bsc#1051510).\n- kbuild: move '_all' target out of $(KBUILD_SRC) conditional (bsc#1114279).\n- kernfs: update comment about kernfs_path() return value (bsc#1051510).\n- kgdboc: Passing ekgdboc to command line causes panic (bsc#1051510).\n- kprobes/x86: Fix %p uses in error messages (bsc#1110006).\n- KVM: arm/arm64: Introduce vcpu_el1_is_32bit (bsc#1110998).\n- KVM: Make VM ioctl do valloc for some archs (bsc#1111506).\n- KVM: nVMX: Always reflect #NM VM-exits to L1 (bsc#1106240).\n- KVM: nVMX: move check_vmentry_postreqs() call to nested_vmx_enter_non_root_mode() (bsc#1106240).\n- KVM: PPC: Add pt_regs into kvm_vcpu_arch and move vcpu->arch.gpr[] into it (bsc#1061840).\n- KVM: PPC: Avoid marking DMA-mapped pages dirty in real mode (bsc#1061840).\n- KVM: PPC: Book3S: Add MMIO emulation for VMX instructions (bsc#1061840).\n- KVM: PPC: Book3S: Allow backing bigger guest IOMMU pages with smaller physical pages (bsc#1061840).\n- KVM: PPC: Book3S: Check KVM_CREATE_SPAPR_TCE_64 parameters (bsc#1061840).\n- KVM: PPC: Book3S: Eliminate some unnecessary checks (bsc#1061840).\n- KVM: PPC: Book3S: Fix compile error that occurs with some gcc versions (bsc#1061840).\n- KVM: PPC: Book3S: Fix matching of hardware and emulated TCE tables (bsc#1061840).\n- KVM: PPC: Book3S HV: Add of_node_put() in success path (bsc#1061840).\n- KVM: PPC: Book3S HV: Add 'online' register to ONE_REG interface (bsc#1061840).\n- KVM: PPC: Book3S HV: Allow creating max number of VCPUs on POWER9 (bsc#1061840).\n- KVM: PPC: Book3S HV: Allow HPT and radix on the same core for POWER9 v2.2 (bsc#1061840).\n- KVM: PPC: Book3S HV: Avoid crash from THP collapse during radix page fault (bsc#1061840).\n- KVM: PPC: Book3S HV: Avoid shifts by negative amounts (bsc#1061840).\n- KVM: PPC: Book3S HV: Check DR not IR to chose real vs virt mode MMIOs (bsc#1061840).\n- KVM: PPC: Book3S HV: Do not truncate HPTE index in xlate function (bsc#1061840).\n- KVM: PPC: Book3S HV: Do not use compound_order to determine host mapping size (bsc#1061840).\n- KVM: PPC: Book3S HV: Do not use existing 'prodded' flag for XIVE escalations (bsc#1061840).\n- KVM: PPC: Book 3S HV: Do ptesync in radix guest exit path (bsc#1061840).\n- KVM: PPC: Book3S HV: Do SLB load/unload with guest LPCR value loaded (bsc#1061840).\n- KVM: PPC: Book3S HV: Enable migration of decrementer register (bsc#1061840).\n- KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix conditions for starting vcpu (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix constant size warning (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix duplication of host SLB entries (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix guest r11 corruption with POWER9 TM workarounds (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix handling of large pages in radix page fault handler (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix handling of secondary HPTEG in HPT resizing code (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix inaccurate comment (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix kvmppc_bad_host_intr for real mode interrupts (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix trap number return from __kvmppc_vcore_entry (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix typo in kvmppc_hv_get_dirty_log_radix() (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix VRMA initialization with 2MB or 1GB memory backing (bsc#1061840).\n- KVM: PPC: Book3S HV: Handle 1GB pages in radix page fault handler (bsc#1061840).\n- KVM: PPC: Book3S HV: Improve handling of debug-trigger HMIs on POWER9 (bsc#1061840).\n- KVM: PPC: Book3S HV: Keep XIVE escalation interrupt masked unless ceded (bsc#1061840).\n- KVM: PPC: Book3S HV: Lockless tlbie for HPT hcalls (bsc#1061840).\n- KVM: PPC: Book3S HV: Make HPT resizing work on POWER9 (bsc#1061840).\n- KVM: PPC: Book3S HV: Make radix clear pte when unmapping (bsc#1061840).\n- KVM: PPC: Book3S HV: Make radix use correct tlbie sequence in kvmppc_radix_tlbie_page (bsc#1061840).\n- KVM: PPC: Book3S HV: Make xive_pushed a byte, not a word (bsc#1061840).\n- KVM: PPC: Book3S HV: Pack VCORE IDs to access full VCPU ID space (bsc#1061840).\n- KVM: PPC: Book3S HV: radix: Do not clear partition PTE when RC or write bits do not match (bsc#1061840).\n- KVM: PPC: Book3S HV: Radix page fault handler optimizations (bsc#1061840).\n- KVM: PPC: Book3S HV: radix: Refine IO region partition scope attributes (bsc#1061840).\n- KVM: PPC: Book3S HV: Read kvm->arch.emul_smt_mode under kvm->lock (bsc#1061840).\n- KVM: PPC: Book3S HV: Recursively unmap all page table entries when unmapping (bsc#1061840).\n- KVM: PPC: Book3S HV: Remove useless statement (bsc#1061840).\n- KVM: PPC: Book3S HV: Remove vcpu->arch.dec usage (bsc#1061840).\n- KVM: PPC: Book3S HV: Send kvmppc_bad_interrupt NMIs to Linux handlers (bsc#1061840).\n- KVM: PPC: Book3S HV: Set RWMR on POWER8 so PURR/SPURR count correctly (bsc#1061840).\n- KVM: PPC: Book3S HV: Snapshot timebase offset on guest entry (bsc#1061840).\n- KVM: PPC: Book3S HV: Streamline setting of reference and change bits (bsc#1061840).\n- KVM: PPC: Book3S HV: Use a helper to unmap ptes in the radix fault path (bsc#1061840).\n- KVM: PPC: Book3S HV: Use __gfn_to_pfn_memslot() in page fault handler (bsc#1061840).\n- KVM: PPC: Book3S HV: XIVE: Resend re-routed interrupts on CPU priority change (bsc#1061840).\n- KVM: PPC: Book3S PR: Add guest MSR parameter for kvmppc_save_tm()/kvmppc_restore_tm() (bsc#1061840).\n- KVM: PPC: Book3S PR: Move kvmppc_save_tm/kvmppc_restore_tm to separate file (bsc#1061840).\n- KVM: PPC: Book3S: Use correct page shift in H_STUFF_TCE (bsc#1061840).\n- KVM: PPC: Fix a mmio_host_swabbed uninitialized usage issue (bsc#1061840).\n- KVM: PPC: Make iommu_table::it_userspace big endian (bsc#1061840).\n- KVM: PPC: Move nip/ctr/lr/xer registers to pt_regs in kvm_vcpu_arch (bsc#1061840).\n- KVM: PPC: Use seq_puts() in kvmppc_exit_timing_show() (bsc#1061840).\n- KVM: s390: vsie: copy wrapping keys to right place (git-fixes).\n- KVM: SVM: Add MSR-based feature support for serializing LFENCE (bsc#1106240).\n- KVM: svm: Ensure an IBPB on all affected CPUs when freeing a vmcb (bsc#1114279).\n- KVM: VMX: re-add ple_gap module parameter (bsc#1106240).\n- KVM: VMX: support MSR_IA32_ARCH_CAPABILITIES as a feature MSR (bsc#1106240).\n- KVM: VMX: Tell the nested hypervisor to skip L1D flush on vmentry (bsc#1106240).\n- KVM: x86: Add a framework for supporting MSR-based features (bsc#1106240).\n- KVM: x86: define SVM/VMX specific kvm_arch_[alloc|free]_vm (bsc#1111506).\n- KVM: x86: Fix kernel info-leak in KVM_HC_CLOCK_PAIRING hypercall (bsc#1106240).\n- KVM: X86: Introduce kvm_get_msr_feature() (bsc#1106240).\n- KVM/x86: kABI fix for vm_alloc/vm_free changes (bsc#1111506).\n- KVM: x86: Set highest physical address bits in non-present/reserved SPTEs (bsc#1106240).\n- libceph: bump CEPH_MSG_MAX_DATA_LEN (bsc#1114839).\n- libceph: fall back to sendmsg for slab pages (bsc#1118316).\n- libertas: call into generic suspend code before turning off power (bsc#1051510).\n- libertas: do not set URB_ZERO_PACKET on IN USB transfer (bsc#1051510).\n- libnvdimm, badrange: remove a WARN for list_empty (bsc#1112128).\n- libnvdimm, dimm: Maximize label transfer size (bsc#1111921, bsc#1113408, bsc#1113972).\n- libnvdimm: Hold reference on parent while scheduling async init (bsc#1116891).\n- libnvdimm: Introduce locked DIMM capacity support (bsc#1112128).\n- libnvdimm, label: change nvdimm_num_label_slots per UEFI 2.7 (bsc#1111921, bsc#1113408, bsc#1113972).\n- libnvdimm, label: Fix sparse warning (bsc#1111921, bsc#1113408, bsc#1113972).\n- libnvdimm: move poison list functions to a new 'badrange' file (bsc#1112128).\n- libnvdimm/nfit_test: add firmware download emulation (bsc#1112128).\n- libnvdimm/nfit_test: adding support for unit testing enable LSS status (bsc#1112128).\n- libnvdimm, region: Fail badblocks listing for inactive regions (bsc#1116899).\n- libnvdimm, testing: Add emulation for smart injection commands (bsc#1112128).\n- libnvdimm, testing: update the default smart ctrl_temperature (bsc#1112128).\n- lib/ubsan: add type mismatch handler for new GCC/Clang (bsc#1051510).\n- lib/ubsan.c: s/missaligned/misaligned/ (bsc#1051510).\n- livepatch: create and include UAPI headers ().\n- llc: set SOCK_RCU_FREE in llc_sap_add_socket() (networking-stable-18_11_02).\n- lockd: fix 'list_add double add' caused by legacy signal interface (git-fixes).\n- loop: add recursion validation to LOOP_CHANGE_FD (bsc#1112711).\n- loop: do not call into filesystem while holding lo_ctl_mutex (bsc#1112710).\n- loop: fix LOOP_GET_STATUS lock imbalance (bsc#1113284).\n- mac80211: Always report TX status (bsc#1051510).\n- mac80211: fix TX status reporting for ieee80211s (bsc#1051510).\n- mac80211_hwsim: do not omit multicast announce of first added radio (bsc#1051510).\n- mac80211: minstrel: fix using short preamble CCK rates on HT clients (bsc#1051510).\n- mac80211: TDLS: fix skb queue/priority assignment (bsc#1051510).\n- mach64: detect the dot clock divider correctly on sparc (bsc#1051510).\n- mach64: fix display corruption on big endian machines (bsc#1113722)\n- mach64: fix image corruption due to reading accelerator registers (bsc#1113722)\n- mailbox: PCC: handle parse error (bsc#1051510).\n- make sure that __dentry_kill() always invalidates d_seq, unhashed or not (git-fixes).\n- md: allow metadata updates while suspending an array - fix (git-fixes).\n- MD: fix invalid stored role for a disk - try2 (git-fixes).\n- md: fix NULL dereference of mddev->pers in remove_and_add_spares() (git-fixes).\n- md/raid10: fix that replacement cannot complete recovery after reassemble (git-fixes).\n- md/raid1: add error handling of read error from FailFast device (git-fixes).\n- md/raid5-cache: disable reshape completely (git-fixes).\n- md/raid5: fix data corruption of replacements after originals dropped (git-fixes).\n- media: af9035: prevent buffer overflow on write (bsc#1051510).\n- media: cx231xx: fix potential sign-extension overflow on large shift (bsc#1051510).\n- media: dvb: fix compat ioctl translation (bsc#1051510).\n- media: em28xx: fix input name for Terratec AV 350 (bsc#1051510).\n- media: em28xx: use a default format if TRY_FMT fails (bsc#1051510).\n- media: pci: cx23885: handle adding to list failure (bsc#1051510).\n- media: tvp5150: avoid going past array on v4l2_querymenu() (bsc#1051510).\n- media: tvp5150: fix switch exit in set control handler (bsc#1051510).\n- media: tvp5150: fix width alignment during set_selection() (bsc#1051510).\n- media: uvcvideo: Fix uvc_alloc_entity() allocation alignment (bsc#1051510).\n- media: v4l2-tpg: fix kernel oops when enabling HFLIP and OSD (bsc#1051510).\n- media: vsp1: Fix YCbCr planar formats pitch calculation (bsc#1051510).\n- memory_hotplug: cond_resched in __remove_pages (bnc#1114178).\n- mfd: arizona: Correct calling of runtime_put_sync (bsc#1051510).\n- mfd: menelaus: Fix possible race condition and leak (bsc#1051510).\n- mfd: omap-usb-host: Fix dts probe of children (bsc#1051510).\n- mlxsw: spectrum: Fix IP2ME CPU policer configuration (networking-stable-18_11_21).\n- mmc: block: avoid multiblock reads for the last sector in SPI mode (bsc#1051510).\n- mmc: dw_mmc-rockchip: correct property names in debug (bsc#1051510).\n- mmc: sdhci-pci-o2micro: Add quirk for O2 Micro dev 0x8620 rev 0x01 (bsc#1051510).\n- mm: handle no memcg case in memcg_kmem_charge() properly (bnc#1113677).\n- mm/migrate: Use spin_trylock() while resetting rate limit ().\n- mm: /proc/pid/pagemap: hide swap entries from unprivileged users (Git-fixes bsc#1109907).\n- mm: rework memcg kernel stack accounting (bnc#1113677).\n- modpost: ignore livepatch unresolved relocations ().\n- mount: Do not allow copying MNT_UNBINDABLE|MNT_LOCKED mounts (bsc#1117819).\n- mount: Prevent MNT_DETACH from disconnecting locked mounts (bsc#1117820).\n- mount: Retest MNT_LOCKED in do_umount (bsc#1117818).\n- move changes without Git-commit out of sorted section\n- neighbour: confirm neigh entries when ARP packet is received (networking-stable-18_09_24).\n- net/af_iucv: drop inbound packets with invalid flags (bnc#1113501, LTC#172679).\n- net/af_iucv: fix skb handling on HiperTransport xmit error (bnc#1113501, LTC#172679).\n- net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT (networking-stable-18_09_24).\n- net: aquantia: memory corruption on jumbo frames (networking-stable-18_10_16).\n- net: bcmgenet: Poll internal PHY for GENETv5 (networking-stable-18_11_02).\n- net: bcmgenet: protect stop from timeout (networking-stable-18_11_21).\n- net: bcmgenet: use MAC link status for fixed phy (networking-stable-18_09_11).\n- net: bridge: remove ipv6 zero address check in mcast queries (git-fixes).\n- net: dsa: bcm_sf2: Call setup during switch resume (networking-stable-18_10_16).\n- net: dsa: bcm_sf2: Fix unbind ordering (networking-stable-18_10_16).\n- net: ena: add functions for handling Low Latency Queues in ena_com (bsc#1111696 bsc#1117561).\n- net: ena: add functions for handling Low Latency Queues in ena_netdev (bsc#1111696 bsc#1117561).\n- net: ena: change rx copybreak default to reduce kernel memory pressure (bsc#1111696 bsc#1117561).\n- net: ena: complete host info to match latest ENA spec (bsc#1111696 bsc#1117561).\n- net: ena: enable Low Latency Queues (bsc#1111696 bsc#1117561).\n- net: ena: explicit casting and initialization, and clearer error handling (bsc#1111696 bsc#1117561).\n- net: ena: fix auto casting to boolean (bsc#1111696 bsc#1117561).\n- net: ena: fix compilation error in xtensa architecture (bsc#1111696 bsc#1117561).\n- net: ena: fix crash during failed resume from hibernation (bsc#1111696 bsc#1117561).\n- net: ena: fix indentations in ena_defs for better readability (bsc#1111696 bsc#1117561).\n- net: ena: Fix Kconfig dependency on X86 (bsc#1111696 bsc#1117561).\n- net: ena: fix NULL dereference due to untimely napi initialization (bsc#1111696 bsc#1117561).\n- net: ena: fix rare bug when failed restart/resume is followed by driver removal (bsc#1111696 bsc#1117561).\n- net: ena: fix warning in rmmod caused by double iounmap (bsc#1111696 bsc#1117561).\n- net: ena: introduce Low Latency Queues data structures according to ENA spec (bsc#1111696 bsc#1117561).\n- net: ena: limit refill Rx threshold to 256 to avoid latency issues (bsc#1111696 bsc#1117561).\n- net: ena: minor performance improvement (bsc#1111696 bsc#1117561).\n- net: ena: remove ndo_poll_controller (bsc#1111696 bsc#1117561).\n- net: ena: remove redundant parameter in ena_com_admin_init() (bsc#1111696 bsc#1117561).\n- net: ena: update driver version to 2.0.1 (bsc#1111696 bsc#1117561).\n- net: ena: use CSUM_CHECKED device indication to report skb's checksum status (bsc#1111696 bsc#1117561).\n- net: fec: do not dump RX FIFO register when not available (networking-stable-18_11_02).\n- net-gro: reset skb->pkt_type in napi_reuse_skb() (networking-stable-18_11_21).\n- net: hns: fix for unmapping problem when SMMU is on (networking-stable-18_10_16).\n- net: hp100: fix always-true check for link up state (networking-stable-18_09_24).\n- net: ibm: fix return type of ndo_start_xmit function ().\n- net/ibmnvic: Fix deadlock problem in reset ().\n- net/ibmvnic: Fix RTNL deadlock during device reset (bnc#1115431).\n- net: ipmr: fix unresolved entry dumps (networking-stable-18_11_02).\n- net: ipv4: do not let PMTU updates increase route MTU (git-fixes).\n- net/ipv6: Display all addresses in output of /proc/net/if_inet6 (networking-stable-18_10_16).\n- net/ipv6: Fix index counter for unicast addresses in in6_dump_addrs (networking-stable-18_11_02).\n- netlabel: check for IPV4MASK in addrinfo_get (networking-stable-18_10_16).\n- net: macb: do not disable MDIO bus at open/close time (networking-stable-18_09_11).\n- net/mlx5: Check for error in mlx5_attach_interface (networking-stable-18_09_18).\n- net/mlx5e: Fix selftest for small MTUs (networking-stable-18_11_21).\n- net/mlx5e: Set vlan masks for all offloaded TC rules (networking-stable-18_10_16).\n- net/mlx5: E-Switch, Fix memory leak when creating switchdev mode FDB tables (networking-stable-18_09_18).\n- net/mlx5: E-Switch, Fix out of bound access when setting vport rate (networking-stable-18_10_16).\n- net/mlx5: Fix debugfs cleanup in the device init/remove flow (networking-stable-18_09_18).\n- net/mlx5: Fix use-after-free in self-healing flow (networking-stable-18_09_18).\n- net/mlx5: Take only bit 24-26 of wqe.pftype_wq for page fault type (networking-stable-18_11_02).\n- net: mvpp2: Extract the correct ethtype from the skb for tx csum offload (networking-stable-18_10_16).\n- net: mvpp2: fix a txq_done race condition (networking-stable-18_10_16).\n- net/packet: fix packet drop as of virtio gso (networking-stable-18_10_16).\n- net: phy: mdio-gpio: Fix working over slow can_sleep GPIOs (networking-stable-18_11_21).\n- net: qca_spi: Fix race condition in spi transfers (networking-stable-18_09_18).\n- net: qmi_wwan: add Wistron Neweb D19Q1 (bsc#1051510).\n- net: sched: action_ife: take reference to meta module (networking-stable-18_09_11).\n- net/sched: act_pedit: fix dump of extended layered op (networking-stable-18_09_11).\n- net/sched: act_sample: fix NULL dereference in the data path (networking-stable-18_09_24).\n- net: sched: Fix for duplicate class dump (networking-stable-18_11_02).\n- net: sched: Fix memory exposure from short TCA_U32_SEL (networking-stable-18_09_11).\n- net: sched: gred: pass the right attribute to gred_change_table_def() (networking-stable-18_11_02).\n- net: smsc95xx: Fix MTU range (networking-stable-18_11_21).\n- net: socket: fix a missing-check bug (networking-stable-18_11_02).\n- net: stmmac: Fix stmmac_mdio_reset() when building stmmac as modules (networking-stable-18_11_02).\n- net: stmmac: Fixup the tail addr setting in xmit path (networking-stable-18_10_16).\n- net: systemport: Fix wake-up interrupt race during resume (networking-stable-18_10_16).\n- net: systemport: Protect stop from timeout (networking-stable-18_11_21).\n- net: udp: fix handling of CHECKSUM_COMPLETE packets (networking-stable-18_11_02).\n- net/usb: cancel pending work when unbinding smsc75xx (networking-stable-18_10_16).\n- NFC: nfcmrvl_uart: fix OF child-node lookup (bsc#1051510).\n- nfit_test: add error injection DSMs (bsc#1112128).\n- nfit_test: fix buffer overrun, add sanity check (bsc#1112128).\n- nfit_test: improve structure offset handling (bsc#1112128).\n- nfit_test: prevent parsing error of nfit_test.0 (bsc#1112128).\n- nfit_test: when clearing poison, also remove badrange entries (bsc#1112128).\n- nfp: wait for posted reconfigs when disabling the device (networking-stable-18_09_11).\n- NFS: Avoid quadratic search when freeing delegations (bsc#1084760).\n- NFS: Avoid RCU usage in tracepoints (git-fixes).\n- NFS: commit direct writes even if they fail partially (git-fixes).\n- nfsd4: permit layoutget of executable-only files (git-fixes).\n- nfsd: check for use of the closed special stateid (git-fixes).\n- nfsd: CLOSE SHOULD return the invalid special stateid for NFSv4.x (x>0) (git-fixes).\n- nfsd: deal with revoked delegations appropriately (git-fixes).\n- nfsd: Ensure we check stateid validity in the seqid operation checks (git-fixes).\n- nfsd: Fix another OPEN stateid race (git-fixes).\n- nfsd: fix corrupted reply to badly ordered compound (git-fixes).\n- nfsd: fix potential use-after-free in nfsd4_decode_getdeviceinfo (git-fixes).\n- nfsd: Fix stateid races between OPEN and CLOSE (git-fixes).\n- NFS: do not wait on commit in nfs_commit_inode() if there were no commit requests (git-fixes).\n- nfsd: restrict rd_maxcount to svc_max_payload in nfsd_encode_readdir (git-fixes).\n- NFS: Ensure we commit after writeback is complete (bsc#1111809).\n- NFS: Fix an incorrect type in struct nfs_direct_req (git-fixes).\n- NFS: Fix a typo in nfs_rename() (git-fixes).\n- NFS: Fix typo in nomigration mount option (git-fixes).\n- NFS: Fix unstable write completion (git-fixes).\n- NFSv4.0 fix client reference leak in callback (git-fixes).\n- NFSv4.1: Fix a potential layoutget/layoutrecall deadlock (git-fixes).\n- NFSv4.1 fix infinite loop on I/O (git-fixes).\n- NFSv4.1: Fix the client behaviour on NFS4ERR_SEQ_FALSE_RETRY (git-fixes).\n- NFSv4.1: Fix up replays of interrupted requests (git-fixes).\n- NFSv4: Fix a typo in nfs41_sequence_process (git-fixes).\n- nl80211: Fix possible Spectre-v1 for CQM RSSI thresholds (bsc#1051510).\n- nl80211: Fix possible Spectre-v1 for NL80211_TXRATE_HT (bsc#1051510).\n- nospec: Include <asm/barrier.h> dependency (bsc#1114279).\n- nvdimm: Clarify comment in sizeof_namespace_index (bsc#1111921, bsc#1113408, bsc#1113972).\n- nvdimm: Remove empty if statement (bsc#1111921, bsc#1113408, bsc#1113972).\n- nvdimm: Sanity check labeloff (bsc#1111921, bsc#1113408, bsc#1113972).\n- nvdimm: Split label init out from the logic for getting config data (bsc#1111921, bsc#1113408, bsc#1113972).\n- nvdimm: Use namespace index data to reduce number of label reads needed (bsc#1111921, bsc#1113408, bsc#1113972).\n- nvme: Free ctrl device name on init failure ().\n- ocfs2: fix a misuse a of brelse after failing ocfs2_check_dir_entry (bsc#1117817).\n- ocfs2: fix locking for res->tracking and dlm->tracking_list (bsc#1117816).\n- ocfs2: fix ocfs2 read block panic (bsc#1117815).\n- ocfs2: free up write context when direct IO failed (bsc#1117821).\n- ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent (bsc#1117808).\n- of: add helper to lookup compatible child node (bsc#1106110)\n- openvswitch: Fix push/pop ethernet validation (networking-stable-18_11_02).\n- orangefs: fix deadlock; do not write i_size in read_iter (bsc#1051510).\n- orangefs: initialize op on loop restart in orangefs_devreq_read (bsc#1051510).\n- orangefs_kill_sb(): deal with allocation failures (bsc#1051510).\n- orangefs: use list_for_each_entry_safe in purge_waiting_ops (bsc#1051510).\n- PCI: Add Device IDs for Intel GPU 'spurious interrupt' quirk (bsc#1051510).\n- PCI/ASPM: Do not initialize link state when aspm_disabled is set (bsc#1051510).\n- PCI/ASPM: Fix link_state teardown on device removal (bsc#1051510).\n- PCI: dwc: remove duplicate fix References: bsc#1115269 Patch has been already applied by the following commit: 9f73db8b7c PCI: dwc: Fix enumeration end when reaching root subordinate (bsc#1051510)\n- PCI: hv: Do not wait forever on a device that has disappeared (bsc#1109806).\n- PCI: hv: Use effective affinity mask (bsc#1109772).\n- PCI: imx6: Fix link training status detection in link up check (bsc#1109806).\n- PCI: iproc: Remove PAXC slot check to allow VF support (bsc#1109806).\n- PCI/MSI: Warn and return error if driver enables MSI/MSI-X twice (bsc#1051510).\n- PCI: Reprogram bridge prefetch registers on resume (bsc#1051510).\n- PCI: vmd: Assign vector zero to all bridges (bsc#1109806).\n- PCI: vmd: Detach resources after stopping root bus (bsc#1109806).\n- PCI: vmd: White list for fast interrupt handlers (bsc#1109806).\n- pcmcia: Implement CLKRUN protocol disabling for Ricoh bridges (bsc#1051510).\n- percpu: make this_cpu_generic_read() atomic w.r.t. interrupts (bsc#1114279).\n- perf: fix invalid bit in diagnostic entry (git-fixes).\n- pinctrl: at91-pio4: fix has_config check in atmel_pctl_dt_subnode_to_map() (bsc#1051510).\n- pinctrl: meson: fix pinconf bias disable (bsc#1051510).\n- pinctrl: qcom: spmi-mpp: Fix drive strength setting (bsc#1051510).\n- pinctrl: qcom: spmi-mpp: Fix err handling of pmic_mpp_set_mux (bsc#1051510).\n- pinctrl: spmi-mpp: Fix pmic_mpp_config_get() to be compliant (bsc#1051510).\n- pinctrl: ssbi-gpio: Fix pm8xxx_pin_config_get() to be compliant (bsc#1051510).\n- pipe: match pipe_max_size data type with procfs (git-fixes).\n- platform/x86: acerhdf: Add BIOS entry for Gateway LT31 v1.3307 (bsc#1051510).\n- platform/x86: intel_telemetry: report debugfs failure (bsc#1051510).\n- pNFS: Always free the session slot on error in nfs4_layoutget_handle_exception (git-fixes).\n- pNFS: Do not release the sequence slot until we've processed layoutget on open (git-fixes).\n- pNFS: Prevent the layout header refcount going to zero in pnfs_roc() (git-fixes).\n- powerpc/64s/hash: Do not use PPC_INVALIDATE_ERAT on CPUs before POWER9 (bsc#1065729).\n- powerpc/boot: Fix opal console in boot wrapper (bsc#1065729).\n- powerpc/kvm/booke: Fix altivec related build break (bsc#1061840).\n- powerpc/kvm: Switch kvm pmd allocator to custom allocator (bsc#1061840).\n- powerpc/mm: Fix typo in comments (bsc#1065729).\n- powerpc/mm/hugetlb: initialize the pagetable cache correctly for hugetlb (bsc#1091800).\n- powerpc/mm/keys: Move pte bits to correct headers (bsc#1078248).\n- powerpc/mm: Rename find_linux_pte_or_hugepte() (bsc#1061840).\n- powerpc/npu-dma.c: Fix crash after __mmu_notifier_register failure (bsc#1055120).\n- powerpc/perf: Update raw-event code encoding comment for power8 (bsc#1065729).\n- powerpc/powernv: Add indirect levels to it_userspace (bsc#1061840).\n- powerpc/powernv: Do not select the cpufreq governors (bsc#1065729).\n- powerpc/powernv: Fix concurrency issue with npu->mmio_atsd_usage (bsc#1055120).\n- powerpc/powernv: Fix opal_event_shutdown() called with interrupts disabled (bsc#1065729).\n- powerpc/powernv/ioda2: Reduce upper limit for DMA window size (bsc#1055120).\n- powerpc/powernv/ioda: Allocate indirect TCE levels on demand (bsc#1061840).\n- powerpc/powernv/ioda: Finish removing explicit max window size check (bsc#1061840).\n- powerpc/powernv/ioda: Remove explicit max window size check (bsc#1061840).\n- powerpc/powernv: Move TCE manupulation code to its own file (bsc#1061840).\n- powerpc/powernv/npu: Add lock to prevent race in concurrent context init/destroy (bsc#1055120).\n- powerpc/powernv/npu: Do not explicitly flush nmmu tlb (bsc#1055120).\n- powerpc/powernv/npu: Fix deadlock in mmio_invalidate() (bsc#1055120).\n- powerpc/powernv/npu: Prevent overwriting of pnv_npu2_init_contex() callback parameters (bsc#1055120).\n- powerpc/powernv/npu: Use flush_all_mm() instead of flush_tlb_mm() (bsc#1055120).\n- powerpc/powernv/pci: Work around races in PCI bridge enabling (bsc#1055120).\n- powerpc/powernv: Rework TCE level allocation (bsc#1061840).\n- powerpc/pseries: Fix build break for SPLPAR=n and CPU hotplug (bsc#1079524, git-fixes).\n- powerpc/pseries: Fix CONFIG_NUMA=n build (bsc#1067906, git-fixes).\n- powerpc/pseries: Fix DTL buffer registration (bsc#1065729).\n- powerpc/pseries: Fix how we iterate over the DTL entries (bsc#1065729).\n- powerpc/pseries: Fix 'OF: ERROR: Bad of_node_put() on /cpus' during DLPAR (bsc#1113295).\n- powerpc/pseries/mobility: Extend start/stop topology update scope (bsc#1116950, bsc#1115709).\n- powerpc: pseries: remove dlpar_attach_node dependency on full path (bsc#1113295).\n- powerpc/xive: Move definition of ESB bits (bsc#1061840).\n- powerpc/xmon: Add ISA v3.0 SPRs to SPR dump (bsc#1061840).\n- power: supply: max8998-charger: Fix platform data retrieval (bsc#1051510).\n- pppoe: fix reception of frames with no mac header (networking-stable-18_09_24).\n- printk: drop in_nmi check from printk_safe_flush_on_panic() (bsc#1112170).\n- printk: Fix panic caused by passing log_buf_len to command line (bsc#1117168).\n- printk/tracing: Do not trace printk_nmi_enter() (bsc#1112208).\n- provide linux/set_memory.h (bsc#1113295).\n- ptp: fix Spectre v1 vulnerability (bsc#1051510).\n- pwm: lpss: Release runtime-pm reference from the driver's remove callback (bsc#1051510).\n- pxa168fb: prepare the clock (bsc#1051510).\n- qmi_wwan: Added support for Gemalto's Cinterion ALASxx WWAN interface (bsc#1051510).\n- qmi_wwan: apply SET_DTR quirk to the SIMCOM shared device ID (bsc#1051510).\n- qmi_wwan: Support dynamic config on Quectel EP06 (bsc#1051510).\n- qrtr: add MODULE_ALIAS macro to smd (bsc#1051510).\n- r8169: Clear RTL_FLAG_TASK_*_PENDING when clearing RTL_FLAG_TASK_ENABLED (bsc#1051510).\n- r8169: fix NAPI handling under high load (networking-stable-18_11_02).\n- race of lockd inetaddr notifiers vs nlmsvc_rqst change (git-fixes).\n- RAID10 BUG_ON in raise_barrier when force is true and conf->barrier is 0 (git-fixes).\n- random: rate limit unseeded randomness warnings (git-fixes).\n- rculist: add list_for_each_entry_from_rcu() (bsc#1084760).\n- rculist: Improve documentation for list_for_each_entry_from_rcu() (bsc#1084760).\n- rds: fix two RCU related problems (networking-stable-18_09_18).\n- README: Clean-up trailing whitespace\n- reiserfs: add check to detect corrupted directory entry (bsc#1109818).\n- reiserfs: do not panic on bad directory entries (bsc#1109818).\n- remoteproc: qcom: Fix potential device node leaks (bsc#1051510).\n- rename a hv patch to reduce conflicts in -AZURE\n- reset: hisilicon: fix potential NULL pointer dereference (bsc#1051510).\n- reset: imx7: Fix always writing bits as 0 (bsc#1051510).\n- resource: Include resource end in walk_*() interfaces (bsc#1114279).\n- Revert 'ceph: fix dentry leak in splice_dentry()' (bsc#1114839).\n- Revert 'powerpc/64: Fix checksum folding in csum_add()' (bsc#1065729).\n- Revert 'rpm/kernel-binary.spec.in: allow unsupported modules for -extra'\n- Revert 'usb: dwc3: gadget: skip Set/Clear Halt when invalid' (bsc#1051510).\n- rpmsg: Correct support for MODULE_DEVICE_TABLE() (git-fixes).\n- rtnetlink: Disallow FDB configuration for non-Ethernet device (networking-stable-18_11_02).\n- rtnetlink: fix rtnl_fdb_dump() for ndmsg header (networking-stable-18_10_16).\n- rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096 (networking-stable-18_10_16).\n- s390/cpum_sf: Add data entry sizes to sampling trailer entry (git-fixes).\n- s390/kvm: fix deadlock when killed by oom (bnc#1113501, LTC#172235).\n- s390/mm: Check for valid vma before zapping in gmap_discard (git-fixes).\n- s390/mm: correct allocate_pgste proc_handler callback (git-fixes).\n- s390: qeth_core_mpc: Use ARRAY_SIZE instead of reimplementing its function (bnc#1113501, LTC#172682).\n- s390/qeth: fix HiperSockets sniffer (bnc#1113501, LTC#172953).\n- s390: qeth: Fix potential array overrun in cmd/rc lookup (bnc#1113501, LTC#172682).\n- s390/qeth: handle failure on workqueue creation (git-fixes).\n- s390/qeth: report 25Gbit link speed (bnc#1113501, LTC#172959).\n- s390: revert ELF_ET_DYN_BASE base changes (git-fixes).\n- s390/sclp_tty: enable line mode tty even if there is an ascii console (git-fixes).\n- s390/sthyi: add cache to store hypervisor info (LTC#160415, bsc#1068273).\n- s390/sthyi: add s390_sthyi system call (LTC#160415, bsc#1068273).\n- s390/sthyi: reorganize sthyi implementation (LTC#160415, bsc#1068273).\n- sched/numa: Limit the conditions where scan period is reset ().\n- scsi: core: Allow state transitions from OFFLINE to BLOCKED (bsc#1112246).\n- scsi: core: Allow state transitions from OFFLINE to BLOCKED (bsc#1112246).\n- scsi: core: Avoid that SCSI device removal through sysfs triggers a deadlock (bsc#1114578).\n- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1104731).\n- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1104731).\n- scsi: libfc: retry PRLI if we cannot analyse the payload (bsc#1104731).\n- scsi: libfc: retry PRLI if we cannot analyse the payload (bsc#1104731).\n- scsi: libsas: remove irq save in sas_ata_qc_issue() (bsc#1114580).\n- scsi: lpfc: add support to retrieve firmware logs (bsc#1114015).\n- scsi: lpfc: add Trunking support (bsc#1114015).\n- scsi: lpfc: Correct errors accessing fw log (bsc#1114015).\n- scsi: lpfc: Correct invalid EQ doorbell write on if_type=6 (bsc#1114015).\n- scsi: lpfc: Correct irq handling via locks when taking adapter offline (bsc#1114015).\n- scsi: lpfc: Correct LCB RJT handling (bsc#1114015).\n- scsi: lpfc: Correct loss of fc4 type on remote port address change (bsc#1114015).\n- scsi: lpfc: Correct race with abort on completion path (bsc#1114015).\n- scsi: lpfc: Correct soft lockup when running mds diagnostics (bsc#1114015).\n- scsi: lpfc: Correct speeds on SFP swap (bsc#1114015).\n- scsi: lpfc: fcoe: Fix link down issue after 1000+ link bounces (bsc#1114015).\n- scsi: lpfc: Fix errors in log messages (bsc#1114015).\n- scsi: lpfc: Fix GFT_ID and PRLI logic for RSCN (bsc#1114015).\n- scsi: lpfc: Fix LOGO/PLOGI handling when triggerd by ABTS Timeout event (bsc#1114015).\n- scsi: lpfc: Fix lpfc_sli4_read_config return value check (bsc#1114015).\n- scsi: lpfc: Fix odd recovery in duplicate FLOGIs in point-to-point (bsc#1114015).\n- scsi: lpfc: Implement GID_PT on Nameserver query to support faster failover (bsc#1114015).\n- scsi: lpfc: Raise nvme defaults to support a larger io and more connectivity (bsc#1114015).\n- scsi: lpfc: raise sg count for nvme to use available sg resources (bsc#1114015).\n- scsi: lpfc: reduce locking when updating statistics (bsc#1114015).\n- scsi: lpfc: Remove set but not used variable 'sgl_size' (bsc#1114015).\n- scsi: lpfc: Reset link or adapter instead of doing infinite nameserver PLOGI retry (bsc#1114015).\n- scsi: lpfc: Synchronize access to remoteport via rport (bsc#1114015).\n- scsi: lpfc: update driver version to 12.0.0.7 (bsc#1114015).\n- scsi: lpfc: update driver version to 12.0.0.8 (bsc#1114015).\n- scsi: qlogicpti: Fix an error handling path in 'qpti_sbus_probe()' (bsc#1114581).\n- scsi: scsi_transport_srp: Fix shost to rport translation (bsc#1114582).\n- scsi: sg: fix minor memory leak in error path (bsc#1114584).\n- scsi: sysfs: Introduce sysfs_{un,}break_active_protection() (bsc#1114578).\n- scsi: target: Fix fortify_panic kernel exception (bsc#1114576).\n- scsi: target/tcm_loop: Avoid that static checkers warn about dead code (bsc#1114577).\n- scsi: target: tcmu: add read length support (bsc#1097755).\n- sctp: fix race on sctp_id2asoc (networking-stable-18_11_02).\n- sctp: fix strchange_flags name for Stream Change Event (networking-stable-18_11_21).\n- sctp: hold transport before accessing its asoc in sctp_transport_get_next (networking-stable-18_09_11).\n- sctp: not allow to set asoc prsctp_enable by sockopt (networking-stable-18_11_21).\n- sctp: not increase stream's incnt before sending addstrm_in request (networking-stable-18_11_21).\n- sctp: update dst pmtu with the correct daddr (networking-stable-18_10_16).\n- serial: 8250: Fix clearing FIFOs in RS485 mode again (bsc#1051510).\n- signal: Properly deliver SIGSEGV from x86 uprobes (bsc#1110006).\n- skip LAYOUTRETURN if layout is invalid (git-fixes).\n- smb2: fix missing files in root share directory listing (bsc#1112907).\n- smb2: fix missing files in root share directory listing (bsc#1112907).\n- smb3: fill in statfs fsid and correct namelen (bsc#1112905).\n- smb3: fill in statfs fsid and correct namelen (bsc#1112905).\n- smb3: fix reset of bytes read and written stats (bsc#1112906).\n- smb3: fix reset of bytes read and written stats (bsc#1112906).\n- smb3: on reconnect set PreviousSessionId field (bsc#1112899).\n- smb3: on reconnect set PreviousSessionId field (bsc#1112899).\n- soc: fsl: qbman: qman: avoid allocating from non existing gen_pool (bsc#1051510).\n- soc/tegra: pmc: Fix child-node lookup (bsc#1051510).\n- soc: ti: QMSS: Fix usage of irq_set_affinity_hint (bsc#1051510).\n- sound: do not call skl_init_chip() to reset intel skl soc (bsc#1051510).\n- sound: enable interrupt after dma buffer initialization (bsc#1051510).\n- spi/bcm63xx-hsspi: keep pll clk enabled (bsc#1051510).\n- spi: bcm-qspi: switch back to reading flash using smaller chunks (bsc#1051510).\n- spi: sh-msiof: fix deferred probing (bsc#1051510).\n- staging: comedi: ni_mio_common: protect register write overflow (bsc#1051510).\n- staging:iio:ad7606: fix voltage scales (bsc#1051510).\n- staging: rtl8723bs: Fix the return value in case of error in 'rtw_wx_read32()' (bsc#1051510).\n- staging: vchiq_arm: fix compat VCHIQ_IOC_AWAIT_COMPLETION (bsc#1051510).\n- sunrpc: Allow connect to return EHOSTUNREACH (git-fixes).\n- sunrpc: Do not use stack buffer with scatterlist (git-fixes).\n- sunrpc: Fix rpc_task_begin trace point (git-fixes).\n- sunrpc: Fix tracepoint storage issues with svc_recv and svc_rqst_status (git-fixes).\n- target: fix buffer offset in core_scsi3_pri_read_full_status (bsc1117349).\n- target: log Data-Out timeouts as errors (bsc#1095805).\n- target: log NOP ping timeouts as errors (bsc#1095805).\n- target: split out helper for cxn timeout error stashing (bsc#1095805).\n- target: stash sess_err_stats on Data-Out timeout (bsc#1095805).\n- target: use ISCSI_IQN_LEN in iscsi_target_stat (bsc#1095805).\n- tcp: do not restart timewait timer on rst reception (networking-stable-18_09_11).\n- test_firmware: fix error return getting clobbered (bsc#1051510).\n- tg3: Add PHY reset for 5717/5719/5720 in change ring and flow control paths (networking-stable-18_11_21).\n- thermal: bcm2835: enable hwmon explicitly (bsc#1108468).\n- thermal: da9062/61: Prevent hardware access during system suspend (bsc#1051510).\n- thermal: rcar_thermal: Prevent hardware access during system suspend (bsc#1051510).\n- tipc: do not assume linear buffer when reading ancillary data (networking-stable-18_11_21).\n- tipc: fix a missing rhashtable_walk_exit() (networking-stable-18_09_11).\n- tipc: fix flow control accounting for implicit connect (networking-stable-18_10_16).\n- tools build: fix # escaping in .cmd files for future Make (git-fixes).\n- tools/testing/nvdimm: advertise a write cache for nfit_test (bsc#1112128).\n- tools/testing/nvdimm: allow custom error code injection (bsc#1112128).\n- tools/testing/nvdimm: disable labels for nfit_test.1 (bsc#1112128).\n- tools/testing/nvdimm: enable labels for nfit_test.1 dimms (bsc#1112128).\n- tools/testing/nvdimm: fix missing newline in nfit_test_dimm 'handle' attribute (bsc#1112128).\n- tools/testing/nvdimm: Fix support for emulating controller temperature (bsc#1112128).\n- tools/testing/nvdimm: force nfit_test to depend on instrumented modules (bsc#1112128).\n- tools/testing/nvdimm: improve emulation of smart injection (bsc#1112128).\n- tools/testing/nvdimm: kaddr and pfn can be NULL to ->direct_access() (bsc#1112128).\n- tools/testing/nvdimm: Make DSM failure code injection an override (bsc#1112128).\n- tools/testing/nvdimm: smart alarm/threshold control (bsc#1112128).\n- tools/testing/nvdimm: stricter bounds checking for error injection commands (bsc#1112128).\n- tools/testing/nvdimm: support nfit_test_dimm attributes under nfit_test.1 (bsc#1112128).\n- tools/testing/nvdimm: unit test clear-error commands (bsc#1112128).\n- tools/vm/page-types.c: fix 'defined but not used' warning (bsc#1051510).\n- tools/vm/slabinfo.c: fix sign-compare warning (bsc#1051510).\n- tpm2-cmd: allow more attempts for selftest execution (bsc#1082555).\n- tpm: add retry logic (bsc#1082555).\n- tpm: consolidate the TPM startup code (bsc#1082555).\n- tpm: do not suspend/resume if power stays on (bsc#1082555).\n- tpm: fix intermittent failure with self tests (bsc#1082555).\n- tpm: fix response size validation in tpm_get_random() (bsc#1082555).\n- tpm: move endianness conversion of ordinals to tpm_input_header (bsc#1082555).\n- tpm: move endianness conversion of TPM_TAG_RQU_COMMAND to tpm_input_header (bsc#1082555).\n- tpm: move the delay_msec increment after sleep in tpm_transmit() (bsc#1082555).\n- tpm: React correctly to RC_TESTING from TPM 2.0 self tests (bsc#1082555).\n- tpm: replace msleep() with usleep_range() in TPM 1.2/2.0 generic drivers (bsc#1082555).\n- tpm: Restore functionality to xen vtpm driver (bsc#1082555).\n- tpm: self test failure should not cause suspend to fail (bsc#1082555).\n- tpm: tpm-interface: fix tpm_transmit/_cmd kdoc (bsc#1082555).\n- tpm: Trigger only missing TPM 2.0 self tests (bsc#1082555).\n- tpm: Use dynamic delay to wait for TPM 2.0 self test result (bsc#1082555).\n- tpm: use tpm2_pcr_read() in tpm2_do_selftest() (bsc#1082555).\n- tpm: use tpm_buf functions in tpm2_pcr_read() (bsc#1082555).\n- tracing: Add barrier to trace_printk() buffer nesting modification (bsc#1112219).\n- tracing: Apply trace_clock changes to instance max buffer (bsc#1117188).\n- tracing: Erase irqsoff trace with empty write (bsc#1117189).\n- tty: check name length in tty_find_polling_driver() (bsc#1051510).\n- tty: Do not block on IO when ldisc change is pending (bnc#1105428).\n- tty: fix data race between tty_init_dev and flush of buf (bnc#1105428).\n- tty: Hold tty_ldisc_lock() during tty_reopen() (bnc#1105428).\n- tty/ldsem: Add lockdep asserts for ldisc_sem (bnc#1105428).\n- tty/ldsem: Convert to regular lockdep annotations (bnc#1105428).\n- tty/ldsem: Decrement wait_readers on timeouted down_read() (bnc#1105428).\n- tty/ldsem: Wake up readers after timed out down_write() (bnc#1105428).\n- tty: Simplify tty->count math in tty_reopen() (bnc#1105428).\n- tty: wipe buffer (bsc#1051510).\n- tty: wipe buffer if not echoing data (bsc#1051510).\n- tun: Consistently configure generic netdev params via rtnetlink (bsc#1051510).\n- tuntap: fix multiqueue rx (networking-stable-18_11_21).\n- udp4: fix IP_CMSG_CHECKSUM for connected sockets (networking-stable-18_09_24).\n- udp6: add missing checks on edumux packet processing (networking-stable-18_09_24).\n- udp6: fix encap return code for resubmitting (git-fixes).\n- uio: ensure class is registered before devices (bsc#1051510).\n- uio: Fix an Oops on load (bsc#1051510).\n- uio: make symbol 'uio_class_registered' static (bsc#1051510).\n- Update config files. Enabled ENA (Amazon network driver) for arm64.\n- usb: cdc-acm: add entry for Hiro (Conexant) modem (bsc#1051510).\n- usb: chipidea: Prevent unbalanced IRQ disable (bsc#1051510).\n- usb: core: Fix hub port connection events lost (bsc#1051510).\n- usb: dwc2: host: do not delay retries for CONTROL IN transfers (bsc#1114385).\n- usb: dwc2: host: Do not retry NAKed transactions right away (bsc#1114385).\n- usb: dwc3: core: Clean up ULPI device (bsc#1051510).\n- usb: dwc3: gadget: fix ISOC TRB type on unaligned transfers (bsc#1051510).\n- usb: dwc3: gadget: Properly check last unaligned/zero chain TRB (bsc#1051510).\n- usb: gadget: fsl_udc_core: check allocation return value and cleanup on failure (bsc#1051510).\n- usb: gadget: fsl_udc_core: fixup struct_udc_setup documentation (bsc#1051510).\n- usb: gadget: storage: Fix Spectre v1 vulnerability (bsc#1051510).\n- usb: gadget: udc: atmel: handle at91sam9rl PMC (bsc#1051510).\n- usb: gadget: u_ether: fix unsafe list iteration (bsc#1051510).\n- usb: host: ohci-at91: fix request of irq for optional gpio (bsc#1051510).\n- usbip: tools: fix atoi() on non-null terminated string (bsc#1051510).\n- usbip:vudc: BUG kmalloc-2048 (Not tainted): Poison overwritten (bsc#1051510).\n- usb: misc: appledisplay: add 20' Apple Cinema Display (bsc#1051510).\n- usbnet: smsc95xx: disable carrier check while suspending (bsc#1051510).\n- usb: omap_udc: fix rejection of out transfers when DMA is used (bsc#1051510).\n- usb: quirks: Add delay-init quirk for Corsair K70 LUX RGB (bsc#1051510).\n- usb: quirks: Add no-lpm quirk for Raydium touchscreens (bsc#1051510).\n- usb: remove LPM management from usb_driver_claim_interface() (bsc#1051510).\n- usb: serial: cypress_m8: fix interrupt-out transfer length (bsc#1051510).\n- usb: serial: option: add two-endpoints device-id flag (bsc#1051510).\n- usb: serial: option: drop redundant interface-class test (bsc#1051510).\n- usb: serial: option: improve Quectel EP06 detection (bsc#1051510).\n- usb: xhci: fix timeout for transition from RExit to U0 (bsc#1051510).\n- userfaultfd: hugetlbfs: fix userfaultfd_huge_must_wait() pte access (bsc#1109739).\n- Use upstream version of pci-hyperv patch (35a88a1)\n- VFS: close race between getcwd() and d_move() (git-fixes).\n- VFS: fix freeze protection in mnt_want_write_file() for overlayfs (git-fixes).\n- vhost: Fix Spectre V1 vulnerability (bsc#1051510).\n- vhost/scsi: truncate T10 PI iov_iter to prot_bytes (bsc#1051510).\n- virtio_net: avoid using netif_tx_disable() for serializing tx routine (networking-stable-18_11_02).\n- VMCI: Resource wildcard match fixed (bsc#1051510).\n- w1: omap-hdq: fix missing bus unregister at removal (bsc#1051510).\n- Workaround for mysterious NVMe breakage with i915 CFL (bsc#1111040).\n- x86/acpi: Prevent X2APIC id 0xffffffff from being accounted (bsc#1110006).\n- x86/boot/KASLR: Work around firmware bugs by excluding EFI_BOOT_SERVICES_* and EFI_LOADER_* from KASLR's choice (bnc#1112878).\n- x86/boot: Move EISA setup to a separate file (bsc#1110006).\n- x86/corruption-check: Fix panic in memory_corruption_check() when boot option without value is provided (bsc#1110006).\n- x86/cpufeature: Add User-Mode Instruction Prevention definitions (bsc#1110006).\n- x86/cpufeatures: Add Intel Total Memory Encryption cpufeature (bsc#1110006).\n- x86/cpu/vmware: Do not trace vmware_sched_clock() (bsc#1114279).\n- x86/eisa: Add missing include (bsc#1110006).\n- x86/EISA: Do not probe EISA bus for Xen PV guests (bsc#1110006).\n- x86/fpu: Remove second definition of fpu in __fpu__restore_sig() (bsc#1110006).\n- x86, hibernate: Fix nosave_regions setup for hibernation (bsc#1110006).\n- x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772).\n- x86/kasan: Panic if there is not enough memory to boot (bsc#1110006).\n- x86/kexec: Correct KEXEC_BACKUP_SRC_END off-by-one error (bsc#1114279).\n- x86/ldt: Remove unused variable in map_ldt_struct() (bsc#1114279).\n- x86/ldt: Split out sanity check in map_ldt_struct() (bsc#1114279).\n- x86/ldt: Unmap PTEs for the slot before freeing LDT pages (bsc#1114279).\n- x86/MCE/AMD: Fix the thresholding machinery initialization order (bsc#1114279).\n- x86/MCE: Fix stack out-of-bounds write in mce-inject.c: Flags_read() (bsc#1110006).\n- x86/MCE: Make correctable error detection look at the Deferred bit (bsc#1114279).\n- x86/mm/pat: Disable preemption around __flush_tlb_all() (bsc#1114279).\n- x86, nfit_test: Add unit test for memcpy_mcsafe() (bsc#1112128).\n- x86/paravirt: Fix some warning messages (bnc#1065600).\n- x86/percpu: Fix this_cpu_read() (bsc#1110006).\n- x86/speculation: Support Enhanced IBRS on future CPUs ().\n- x86/time: Correct the attribute on jiffies' definition (bsc#1110006).\n- x86/xen: Fix boot loader version reported for PVH guests (bnc#1065600).\n- xen/balloon: Support xend-based toolstack (bnc#1065600).\n- xen/blkfront: avoid NULL blkfront_info dereference on device removal (bsc#1111062).\n- xen: fix race in xen_qlock_wait() (bnc#1107256).\n- xen: fix xen_qlock_wait() (bnc#1107256).\n- xen/gntdev: avoid out of bounds access in case of partial gntdev_mmap() (bnc#1065600).\n- xen: make xen_qlock_wait() nestable (bnc#1107256).\n- xen/netfront: do not bug in case of too many frags (bnc#1104824).\n- xen/pvh: do not try to unplug emulated devices (bnc#1065600).\n- xen/pvh: increase early stack size (bnc#1065600).\n- xen: Remove unnecessary BUG_ON from __unbind_from_irq() (bnc#1065600).\n- xen-swiotlb: fix the check condition for xen_swiotlb_free_coherent (bnc#1065600).\n- xen-swiotlb: use actually allocated size on check physical continuous (bnc#1065600).\n- xen/x86: add diagnostic printout to xen_mc_flush() in case of error (bnc#1116183).\n- xfrm: use complete IPv6 addresses for hash (bsc#1109330).\n- xfs: do not fail when converting shortform attr to long form during ATTR_REPLACE (bsc#1105025).\n- xfs: Fix error code in 'xfs_ioc_getbmap()' (git-fixes).\n- xfs: Properly detect when DAX won't be used on any device (bsc#1115976).\n- xhci: Add check for invalid byte size error when UAS devices are connected (bsc#1051510).\n- xhci: Do not print a warning when setting link state for disabled ports (bsc#1051510).\n- xhci: Fix leaking USB3 shared_hcd at xhci removal (bsc#1051510).\n- xprtrdma: Do not defer fencing an async RPC's chunks (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-Live-Patching-12-SP4-2018-2894", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_4072-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:4072-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20184072-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:4072-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-December/004953.html", }, { category: "self", summary: "SUSE Bug 1051510", url: "https://bugzilla.suse.com/1051510", }, { category: "self", summary: "SUSE Bug 1055120", url: "https://bugzilla.suse.com/1055120", }, { category: "self", summary: "SUSE Bug 1061840", url: "https://bugzilla.suse.com/1061840", }, { category: "self", summary: "SUSE Bug 1065600", url: "https://bugzilla.suse.com/1065600", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1066674", url: "https://bugzilla.suse.com/1066674", }, { category: "self", summary: "SUSE Bug 1067906", url: "https://bugzilla.suse.com/1067906", }, { category: "self", summary: "SUSE Bug 1068273", url: "https://bugzilla.suse.com/1068273", }, { category: "self", summary: "SUSE Bug 1076830", url: "https://bugzilla.suse.com/1076830", }, { category: "self", summary: "SUSE Bug 1078248", url: "https://bugzilla.suse.com/1078248", }, { category: "self", summary: "SUSE Bug 1079524", url: "https://bugzilla.suse.com/1079524", }, { category: "self", summary: "SUSE Bug 1082555", url: "https://bugzilla.suse.com/1082555", }, { category: "self", summary: "SUSE Bug 1082653", url: "https://bugzilla.suse.com/1082653", }, { category: "self", summary: "SUSE Bug 1083647", url: "https://bugzilla.suse.com/1083647", }, { category: "self", summary: "SUSE Bug 1084760", url: "https://bugzilla.suse.com/1084760", }, { category: "self", summary: "SUSE Bug 1084831", url: "https://bugzilla.suse.com/1084831", }, { category: "self", summary: "SUSE Bug 1085535", url: "https://bugzilla.suse.com/1085535", }, { category: "self", summary: "SUSE Bug 1086196", url: "https://bugzilla.suse.com/1086196", }, { category: "self", summary: "SUSE Bug 1089350", url: "https://bugzilla.suse.com/1089350", }, { category: "self", summary: "SUSE Bug 1091800", url: "https://bugzilla.suse.com/1091800", }, { category: "self", summary: "SUSE Bug 1094825", url: "https://bugzilla.suse.com/1094825", }, { category: "self", summary: "SUSE Bug 1095805", url: "https://bugzilla.suse.com/1095805", }, { category: "self", summary: "SUSE Bug 1097755", url: "https://bugzilla.suse.com/1097755", }, { category: "self", summary: "SUSE Bug 1100132", url: "https://bugzilla.suse.com/1100132", }, { category: "self", summary: "SUSE Bug 1103356", url: "https://bugzilla.suse.com/1103356", }, { category: "self", summary: "SUSE Bug 1103925", url: "https://bugzilla.suse.com/1103925", }, { category: "self", summary: "SUSE Bug 1104124", url: "https://bugzilla.suse.com/1104124", }, { category: "self", summary: "SUSE Bug 1104731", url: "https://bugzilla.suse.com/1104731", }, { category: "self", summary: "SUSE Bug 1104824", url: "https://bugzilla.suse.com/1104824", }, { category: "self", summary: "SUSE Bug 1105025", url: "https://bugzilla.suse.com/1105025", }, { category: "self", summary: "SUSE Bug 1105428", url: "https://bugzilla.suse.com/1105428", }, { category: "self", summary: "SUSE Bug 1106105", url: "https://bugzilla.suse.com/1106105", }, { category: "self", summary: "SUSE Bug 1106110", url: "https://bugzilla.suse.com/1106110", }, { category: "self", summary: "SUSE Bug 1106237", url: "https://bugzilla.suse.com/1106237", }, { category: "self", summary: "SUSE Bug 1106240", url: "https://bugzilla.suse.com/1106240", }, { category: "self", summary: "SUSE Bug 1107256", url: "https://bugzilla.suse.com/1107256", }, { category: "self", summary: "SUSE Bug 1107385", url: "https://bugzilla.suse.com/1107385", }, { category: "self", summary: "SUSE Bug 1107866", url: "https://bugzilla.suse.com/1107866", }, { category: "self", summary: "SUSE Bug 1108377", url: "https://bugzilla.suse.com/1108377", }, { category: "self", summary: "SUSE Bug 1108468", url: "https://bugzilla.suse.com/1108468", }, { category: "self", summary: "SUSE Bug 1109330", url: "https://bugzilla.suse.com/1109330", }, { category: "self", summary: "SUSE Bug 1109739", url: "https://bugzilla.suse.com/1109739", }, { category: "self", summary: "SUSE Bug 1109772", url: "https://bugzilla.suse.com/1109772", }, { category: "self", summary: "SUSE Bug 1109806", url: "https://bugzilla.suse.com/1109806", }, { category: "self", summary: "SUSE Bug 1109818", url: "https://bugzilla.suse.com/1109818", }, { category: "self", summary: "SUSE Bug 1109907", url: "https://bugzilla.suse.com/1109907", }, { category: "self", summary: "SUSE Bug 1109911", url: "https://bugzilla.suse.com/1109911", }, { category: "self", summary: "SUSE Bug 1109915", url: "https://bugzilla.suse.com/1109915", }, { category: "self", summary: "SUSE Bug 1109919", url: "https://bugzilla.suse.com/1109919", }, { category: "self", summary: "SUSE Bug 1109951", url: "https://bugzilla.suse.com/1109951", }, { category: "self", summary: "SUSE Bug 1110006", url: "https://bugzilla.suse.com/1110006", }, { category: "self", summary: "SUSE Bug 1110998", url: "https://bugzilla.suse.com/1110998", }, { category: "self", summary: "SUSE Bug 1111040", url: "https://bugzilla.suse.com/1111040", }, { category: "self", summary: "SUSE Bug 1111062", url: "https://bugzilla.suse.com/1111062", }, { category: "self", summary: "SUSE Bug 1111174", url: "https://bugzilla.suse.com/1111174", }, { category: "self", summary: "SUSE Bug 1111506", url: "https://bugzilla.suse.com/1111506", }, { category: "self", summary: "SUSE Bug 1111696", url: "https://bugzilla.suse.com/1111696", }, { category: "self", summary: "SUSE Bug 1111809", url: "https://bugzilla.suse.com/1111809", }, { category: "self", summary: "SUSE Bug 1111921", url: "https://bugzilla.suse.com/1111921", }, { category: "self", summary: "SUSE Bug 1111983", url: "https://bugzilla.suse.com/1111983", }, { category: "self", summary: "SUSE Bug 1112128", url: "https://bugzilla.suse.com/1112128", }, { category: "self", summary: "SUSE Bug 1112170", url: "https://bugzilla.suse.com/1112170", }, { category: "self", summary: "SUSE Bug 1112173", url: "https://bugzilla.suse.com/1112173", }, { category: "self", summary: "SUSE Bug 1112208", url: "https://bugzilla.suse.com/1112208", }, { category: "self", summary: "SUSE Bug 1112219", url: "https://bugzilla.suse.com/1112219", }, { category: "self", summary: "SUSE Bug 1112221", url: "https://bugzilla.suse.com/1112221", }, { category: "self", summary: "SUSE Bug 1112246", url: "https://bugzilla.suse.com/1112246", }, { category: "self", summary: "SUSE Bug 1112372", url: "https://bugzilla.suse.com/1112372", }, { category: "self", summary: "SUSE Bug 1112514", url: "https://bugzilla.suse.com/1112514", }, { category: "self", summary: "SUSE Bug 1112554", url: "https://bugzilla.suse.com/1112554", }, { category: "self", summary: "SUSE Bug 1112708", url: "https://bugzilla.suse.com/1112708", }, { category: "self", summary: "SUSE Bug 1112710", url: "https://bugzilla.suse.com/1112710", }, { category: "self", summary: "SUSE Bug 1112711", url: "https://bugzilla.suse.com/1112711", }, { category: "self", summary: "SUSE Bug 1112712", url: "https://bugzilla.suse.com/1112712", }, { category: "self", summary: "SUSE Bug 1112713", url: "https://bugzilla.suse.com/1112713", }, { category: "self", summary: "SUSE Bug 1112731", url: "https://bugzilla.suse.com/1112731", }, { category: "self", summary: "SUSE Bug 1112732", url: "https://bugzilla.suse.com/1112732", }, { category: "self", summary: "SUSE Bug 1112733", url: "https://bugzilla.suse.com/1112733", }, { category: "self", summary: "SUSE Bug 1112734", url: "https://bugzilla.suse.com/1112734", }, { category: "self", summary: "SUSE Bug 1112735", url: "https://bugzilla.suse.com/1112735", }, { category: "self", summary: "SUSE Bug 1112736", url: "https://bugzilla.suse.com/1112736", }, { category: "self", summary: "SUSE Bug 1112738", url: "https://bugzilla.suse.com/1112738", }, { category: "self", summary: "SUSE Bug 1112739", url: "https://bugzilla.suse.com/1112739", }, { category: "self", summary: "SUSE Bug 1112740", url: "https://bugzilla.suse.com/1112740", }, { category: "self", summary: "SUSE Bug 1112741", url: "https://bugzilla.suse.com/1112741", }, { category: "self", summary: "SUSE Bug 1112743", url: "https://bugzilla.suse.com/1112743", }, { category: "self", summary: "SUSE Bug 1112745", url: "https://bugzilla.suse.com/1112745", }, { category: "self", summary: "SUSE Bug 1112746", url: "https://bugzilla.suse.com/1112746", }, { category: "self", summary: "SUSE Bug 1112878", url: "https://bugzilla.suse.com/1112878", }, { category: "self", summary: "SUSE Bug 1112894", url: "https://bugzilla.suse.com/1112894", }, { category: "self", summary: "SUSE Bug 1112899", url: "https://bugzilla.suse.com/1112899", }, { category: "self", summary: "SUSE Bug 1112902", url: "https://bugzilla.suse.com/1112902", }, { category: "self", summary: "SUSE Bug 1112903", url: "https://bugzilla.suse.com/1112903", }, { category: "self", summary: "SUSE Bug 1112905", url: "https://bugzilla.suse.com/1112905", }, { category: "self", summary: "SUSE Bug 1112906", url: "https://bugzilla.suse.com/1112906", }, { category: "self", summary: "SUSE Bug 1112907", url: "https://bugzilla.suse.com/1112907", }, { category: "self", summary: "SUSE Bug 1112963", url: "https://bugzilla.suse.com/1112963", }, { category: "self", summary: "SUSE Bug 1113257", url: "https://bugzilla.suse.com/1113257", }, { category: "self", summary: "SUSE Bug 1113284", url: "https://bugzilla.suse.com/1113284", }, { category: "self", summary: "SUSE Bug 1113295", url: "https://bugzilla.suse.com/1113295", }, { category: "self", summary: "SUSE Bug 1113408", url: "https://bugzilla.suse.com/1113408", }, { category: "self", summary: "SUSE Bug 1113412", url: "https://bugzilla.suse.com/1113412", }, { category: "self", summary: "SUSE Bug 1113501", url: "https://bugzilla.suse.com/1113501", }, { category: "self", summary: "SUSE Bug 1113667", url: "https://bugzilla.suse.com/1113667", }, { category: "self", summary: "SUSE Bug 1113677", url: "https://bugzilla.suse.com/1113677", }, { category: "self", summary: "SUSE Bug 1113722", url: "https://bugzilla.suse.com/1113722", }, { category: "self", summary: "SUSE Bug 1113751", url: "https://bugzilla.suse.com/1113751", }, { category: "self", summary: "SUSE Bug 1113769", url: "https://bugzilla.suse.com/1113769", }, { category: "self", summary: "SUSE Bug 1113780", url: "https://bugzilla.suse.com/1113780", }, { category: "self", summary: "SUSE Bug 1113972", url: "https://bugzilla.suse.com/1113972", }, { category: "self", summary: "SUSE Bug 1114015", url: "https://bugzilla.suse.com/1114015", }, { category: "self", summary: "SUSE Bug 1114178", url: "https://bugzilla.suse.com/1114178", }, { category: "self", summary: "SUSE Bug 1114279", url: "https://bugzilla.suse.com/1114279", }, { category: "self", summary: "SUSE Bug 1114385", url: "https://bugzilla.suse.com/1114385", }, { category: "self", summary: "SUSE Bug 1114576", url: "https://bugzilla.suse.com/1114576", }, { category: "self", summary: "SUSE Bug 1114577", url: "https://bugzilla.suse.com/1114577", }, { category: "self", summary: "SUSE Bug 1114578", url: "https://bugzilla.suse.com/1114578", }, { category: "self", summary: "SUSE Bug 1114579", url: "https://bugzilla.suse.com/1114579", }, { category: "self", summary: "SUSE Bug 1114580", url: "https://bugzilla.suse.com/1114580", }, { category: "self", summary: "SUSE Bug 1114581", url: "https://bugzilla.suse.com/1114581", }, { category: "self", summary: "SUSE Bug 1114582", url: "https://bugzilla.suse.com/1114582", }, { category: "self", summary: "SUSE Bug 1114583", url: "https://bugzilla.suse.com/1114583", }, { category: "self", summary: "SUSE Bug 1114584", url: "https://bugzilla.suse.com/1114584", }, { category: "self", summary: "SUSE Bug 1114585", url: "https://bugzilla.suse.com/1114585", }, { category: "self", summary: "SUSE Bug 1114839", url: "https://bugzilla.suse.com/1114839", }, { category: "self", summary: "SUSE Bug 1115074", url: "https://bugzilla.suse.com/1115074", }, { category: "self", summary: "SUSE Bug 1115269", url: "https://bugzilla.suse.com/1115269", }, { category: "self", summary: "SUSE Bug 1115431", url: "https://bugzilla.suse.com/1115431", }, { category: "self", summary: "SUSE Bug 1115433", url: "https://bugzilla.suse.com/1115433", }, { category: "self", summary: "SUSE Bug 1115440", url: "https://bugzilla.suse.com/1115440", }, { category: "self", summary: "SUSE Bug 1115567", url: "https://bugzilla.suse.com/1115567", }, { category: "self", summary: "SUSE Bug 1115709", url: "https://bugzilla.suse.com/1115709", }, { category: "self", summary: "SUSE Bug 1115976", url: "https://bugzilla.suse.com/1115976", }, { category: "self", summary: "SUSE Bug 1116183", url: "https://bugzilla.suse.com/1116183", }, { category: "self", summary: "SUSE Bug 1116692", url: "https://bugzilla.suse.com/1116692", }, { category: "self", summary: "SUSE Bug 1116693", url: "https://bugzilla.suse.com/1116693", }, { category: "self", summary: "SUSE Bug 1116698", url: "https://bugzilla.suse.com/1116698", }, { category: "self", summary: "SUSE Bug 1116699", url: "https://bugzilla.suse.com/1116699", }, { category: "self", summary: "SUSE Bug 1116700", url: "https://bugzilla.suse.com/1116700", }, { category: "self", summary: "SUSE Bug 1116701", url: "https://bugzilla.suse.com/1116701", }, { category: "self", summary: "SUSE Bug 1116862", url: "https://bugzilla.suse.com/1116862", }, { category: "self", summary: "SUSE Bug 1116863", url: "https://bugzilla.suse.com/1116863", }, { category: "self", summary: "SUSE Bug 1116876", url: "https://bugzilla.suse.com/1116876", }, { category: "self", summary: "SUSE Bug 1116877", url: "https://bugzilla.suse.com/1116877", }, { category: "self", summary: "SUSE Bug 1116878", url: "https://bugzilla.suse.com/1116878", }, { category: "self", summary: "SUSE Bug 1116891", url: "https://bugzilla.suse.com/1116891", }, { category: "self", summary: "SUSE Bug 1116895", url: "https://bugzilla.suse.com/1116895", }, { category: "self", summary: "SUSE Bug 1116899", url: "https://bugzilla.suse.com/1116899", }, { category: "self", summary: "SUSE Bug 1116950", url: "https://bugzilla.suse.com/1116950", }, { category: "self", summary: "SUSE Bug 1117168", url: "https://bugzilla.suse.com/1117168", }, { category: "self", summary: "SUSE Bug 1117172", url: "https://bugzilla.suse.com/1117172", }, { category: "self", summary: "SUSE Bug 1117174", url: "https://bugzilla.suse.com/1117174", }, { category: "self", summary: "SUSE Bug 1117181", url: "https://bugzilla.suse.com/1117181", }, { category: "self", summary: "SUSE Bug 1117184", url: "https://bugzilla.suse.com/1117184", }, { category: "self", summary: "SUSE Bug 1117188", url: "https://bugzilla.suse.com/1117188", }, { category: "self", summary: "SUSE Bug 1117189", url: "https://bugzilla.suse.com/1117189", }, { category: "self", summary: "SUSE Bug 1117349", url: "https://bugzilla.suse.com/1117349", }, { category: "self", summary: "SUSE Bug 1117561", url: "https://bugzilla.suse.com/1117561", }, { category: "self", summary: "SUSE Bug 1117788", url: "https://bugzilla.suse.com/1117788", }, { category: "self", summary: "SUSE Bug 1117789", url: "https://bugzilla.suse.com/1117789", }, { category: "self", summary: "SUSE Bug 1117790", url: "https://bugzilla.suse.com/1117790", }, { category: "self", summary: "SUSE Bug 1117791", url: "https://bugzilla.suse.com/1117791", }, { category: "self", summary: "SUSE Bug 1117792", url: "https://bugzilla.suse.com/1117792", }, { category: "self", summary: "SUSE Bug 1117794", url: "https://bugzilla.suse.com/1117794", }, { category: "self", summary: "SUSE Bug 1117795", url: "https://bugzilla.suse.com/1117795", }, { category: "self", summary: "SUSE Bug 1117796", url: "https://bugzilla.suse.com/1117796", }, { category: "self", summary: "SUSE Bug 1117798", url: "https://bugzilla.suse.com/1117798", }, { category: "self", summary: "SUSE Bug 1117799", url: "https://bugzilla.suse.com/1117799", }, { category: "self", summary: "SUSE Bug 1117801", url: "https://bugzilla.suse.com/1117801", }, { category: "self", summary: "SUSE Bug 1117802", url: "https://bugzilla.suse.com/1117802", }, { category: "self", summary: "SUSE Bug 1117803", url: "https://bugzilla.suse.com/1117803", }, { category: "self", summary: "SUSE Bug 1117804", url: "https://bugzilla.suse.com/1117804", }, { category: "self", summary: "SUSE Bug 1117805", url: "https://bugzilla.suse.com/1117805", }, { category: "self", summary: "SUSE Bug 1117806", url: "https://bugzilla.suse.com/1117806", }, { category: "self", summary: "SUSE Bug 1117807", url: "https://bugzilla.suse.com/1117807", }, { category: "self", summary: "SUSE Bug 1117808", url: "https://bugzilla.suse.com/1117808", }, { category: "self", summary: "SUSE Bug 1117815", url: "https://bugzilla.suse.com/1117815", }, { category: "self", summary: "SUSE Bug 1117816", url: "https://bugzilla.suse.com/1117816", }, { category: "self", summary: "SUSE Bug 1117817", url: "https://bugzilla.suse.com/1117817", }, { category: "self", summary: "SUSE Bug 1117818", url: "https://bugzilla.suse.com/1117818", }, { category: "self", summary: "SUSE Bug 1117819", url: "https://bugzilla.suse.com/1117819", }, { category: "self", summary: "SUSE Bug 1117820", url: "https://bugzilla.suse.com/1117820", }, { category: "self", summary: "SUSE Bug 1117821", url: "https://bugzilla.suse.com/1117821", }, { category: "self", summary: "SUSE Bug 1117822", url: "https://bugzilla.suse.com/1117822", }, { category: "self", summary: "SUSE Bug 1118102", url: "https://bugzilla.suse.com/1118102", }, { category: "self", summary: "SUSE Bug 1118136", url: "https://bugzilla.suse.com/1118136", }, { category: "self", summary: "SUSE Bug 1118137", url: "https://bugzilla.suse.com/1118137", }, { category: "self", summary: "SUSE Bug 1118138", url: "https://bugzilla.suse.com/1118138", }, { category: "self", summary: "SUSE Bug 1118140", url: "https://bugzilla.suse.com/1118140", }, { category: "self", summary: "SUSE Bug 1118152", url: "https://bugzilla.suse.com/1118152", }, { category: "self", summary: "SUSE Bug 1118316", url: "https://bugzilla.suse.com/1118316", }, { category: "self", summary: "SUSE CVE CVE-2017-16533 page", url: "https://www.suse.com/security/cve/CVE-2017-16533/", }, { category: "self", summary: "SUSE CVE CVE-2017-18224 page", url: "https://www.suse.com/security/cve/CVE-2017-18224/", }, { category: "self", summary: "SUSE CVE CVE-2018-18281 page", url: "https://www.suse.com/security/cve/CVE-2018-18281/", }, { category: "self", summary: "SUSE CVE CVE-2018-18386 page", url: "https://www.suse.com/security/cve/CVE-2018-18386/", }, { category: "self", summary: "SUSE CVE CVE-2018-18445 page", url: "https://www.suse.com/security/cve/CVE-2018-18445/", }, { category: "self", summary: "SUSE CVE CVE-2018-18710 page", url: "https://www.suse.com/security/cve/CVE-2018-18710/", }, { category: "self", summary: "SUSE CVE CVE-2018-19824 page", url: "https://www.suse.com/security/cve/CVE-2018-19824/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2018-12-11T08:24:24Z", generator: { date: "2018-12-11T08:24:24Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:4072-1", initial_release_date: "2018-12-11T08:24:24Z", revision_history: [ { date: "2018-12-11T08:24:24Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kgraft-patch-4_12_14-95_3-default-1-7.1.ppc64le", product: { name: "kgraft-patch-4_12_14-95_3-default-1-7.1.ppc64le", product_id: "kgraft-patch-4_12_14-95_3-default-1-7.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kgraft-patch-4_12_14-95_3-default-1-7.1.x86_64", product: { name: "kgraft-patch-4_12_14-95_3-default-1-7.1.x86_64", product_id: "kgraft-patch-4_12_14-95_3-default-1-7.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Live Patching 12 SP4", product: { name: "SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-live-patching:12:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-95_3-default-1-7.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.ppc64le", }, product_reference: "kgraft-patch-4_12_14-95_3-default-1-7.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-95_3-default-1-7.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.x86_64", }, product_reference: "kgraft-patch-4_12_14-95_3-default-1-7.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, ], }, vulnerabilities: [ { cve: "CVE-2017-16533", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16533", }, ], notes: [ { category: "general", text: "The usbhid_parse function in drivers/hid/usbhid/hid-core.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16533", url: "https://www.suse.com/security/cve/CVE-2017-16533", }, { category: "external", summary: "SUSE Bug 1066674 for CVE-2017-16533", url: "https://bugzilla.suse.com/1066674", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2017-16533", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2017-16533", url: "https://bugzilla.suse.com/1146519", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-12-11T08:24:24Z", details: "moderate", }, ], title: "CVE-2017-16533", }, { cve: "CVE-2017-18224", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-18224", }, ], notes: [ { category: "general", text: "In the Linux kernel before 4.15, fs/ocfs2/aops.c omits use of a semaphore and consequently has a race condition for access to the extent tree during read operations in DIRECT mode, which allows local users to cause a denial of service (BUG) by modifying a certain e_cpos field.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-18224", url: "https://www.suse.com/security/cve/CVE-2017-18224", }, { category: "external", summary: "SUSE Bug 1084831 for CVE-2017-18224", url: "https://bugzilla.suse.com/1084831", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-12-11T08:24:24Z", details: "moderate", }, ], title: "CVE-2017-18224", }, { cve: "CVE-2018-18281", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18281", }, ], notes: [ { category: "general", text: "Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. This is fixed in the following kernel versions: 4.9.135, 4.14.78, 4.18.16, 4.19.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18281", url: "https://www.suse.com/security/cve/CVE-2018-18281", }, { category: "external", summary: "SUSE Bug 1113769 for CVE-2018-18281", url: "https://bugzilla.suse.com/1113769", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-12-11T08:24:24Z", details: "moderate", }, ], title: "CVE-2018-18281", }, { cve: "CVE-2018-18386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18386", }, ], notes: [ { category: "general", text: "drivers/tty/n_tty.c in the Linux kernel before 4.14.11 allows local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18386", url: "https://www.suse.com/security/cve/CVE-2018-18386", }, { category: "external", summary: "SUSE Bug 1094825 for CVE-2018-18386", url: "https://bugzilla.suse.com/1094825", }, { category: "external", summary: "SUSE Bug 1112039 for CVE-2018-18386", url: "https://bugzilla.suse.com/1112039", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-12-11T08:24:24Z", details: "moderate", }, ], title: "CVE-2018-18386", }, { cve: "CVE-2018-18445", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18445", }, ], notes: [ { category: "general", text: "In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18445", url: "https://www.suse.com/security/cve/CVE-2018-18445", }, { category: "external", summary: "SUSE Bug 1112372 for CVE-2018-18445", url: "https://bugzilla.suse.com/1112372", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-12-11T08:24:24Z", details: "low", }, ], title: "CVE-2018-18445", }, { cve: "CVE-2018-18710", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18710", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18710", url: "https://www.suse.com/security/cve/CVE-2018-18710", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-18710", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-12-11T08:24:24Z", details: "moderate", }, ], title: "CVE-2018-18710", }, { cve: "CVE-2018-19824", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19824", }, ], notes: [ { category: "general", text: "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19824", url: "https://www.suse.com/security/cve/CVE-2018-19824", }, { category: "external", summary: "SUSE Bug 1118152 for CVE-2018-19824", url: "https://bugzilla.suse.com/1118152", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-1-7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-12-11T08:24:24Z", details: "moderate", }, ], title: "CVE-2018-19824", }, ], }
opensuse-su-2024:13704-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
kernel-devel-longterm-6.6.17-1.1 on GA media
Notes
Title of the patch
kernel-devel-longterm-6.6.17-1.1 on GA media
Description of the patch
These are all security issues fixed in the kernel-devel-longterm-6.6.17-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-13704
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "kernel-devel-longterm-6.6.17-1.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the kernel-devel-longterm-6.6.17-1.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-13704", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13704-1.json", }, { category: "self", summary: "SUSE CVE CVE-2016-3695 page", url: "https://www.suse.com/security/cve/CVE-2016-3695/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000251 page", url: "https://www.suse.com/security/cve/CVE-2017-1000251/", }, { category: "self", summary: "SUSE CVE CVE-2017-12153 page", url: "https://www.suse.com/security/cve/CVE-2017-12153/", }, { category: "self", summary: "SUSE CVE CVE-2017-13080 page", url: "https://www.suse.com/security/cve/CVE-2017-13080/", }, { category: "self", summary: "SUSE CVE CVE-2017-14051 page", url: "https://www.suse.com/security/cve/CVE-2017-14051/", }, { category: "self", summary: "SUSE CVE CVE-2017-15129 page", url: "https://www.suse.com/security/cve/CVE-2017-15129/", }, { category: "self", summary: "SUSE CVE CVE-2017-15265 page", url: "https://www.suse.com/security/cve/CVE-2017-15265/", }, { category: "self", summary: "SUSE CVE CVE-2017-16536 page", url: "https://www.suse.com/security/cve/CVE-2017-16536/", }, { category: "self", summary: "SUSE CVE CVE-2017-16537 page", url: "https://www.suse.com/security/cve/CVE-2017-16537/", }, { category: "self", summary: "SUSE CVE CVE-2017-16645 page", url: "https://www.suse.com/security/cve/CVE-2017-16645/", }, { category: "self", summary: "SUSE CVE CVE-2017-16646 page", url: "https://www.suse.com/security/cve/CVE-2017-16646/", }, { category: "self", summary: "SUSE CVE CVE-2017-16647 page", url: "https://www.suse.com/security/cve/CVE-2017-16647/", }, { category: "self", summary: "SUSE CVE CVE-2017-16648 page", url: "https://www.suse.com/security/cve/CVE-2017-16648/", }, { category: "self", summary: "SUSE CVE CVE-2017-16995 page", url: "https://www.suse.com/security/cve/CVE-2017-16995/", }, { category: "self", summary: "SUSE CVE CVE-2017-16996 page", url: "https://www.suse.com/security/cve/CVE-2017-16996/", }, { category: "self", summary: "SUSE CVE CVE-2017-17448 page", url: "https://www.suse.com/security/cve/CVE-2017-17448/", }, { category: "self", summary: "SUSE CVE CVE-2017-17449 page", url: "https://www.suse.com/security/cve/CVE-2017-17449/", }, { category: "self", summary: "SUSE CVE CVE-2017-17450 page", url: "https://www.suse.com/security/cve/CVE-2017-17450/", }, { category: "self", summary: "SUSE CVE CVE-2017-17852 page", url: "https://www.suse.com/security/cve/CVE-2017-17852/", }, { category: "self", summary: "SUSE CVE CVE-2017-17853 page", url: "https://www.suse.com/security/cve/CVE-2017-17853/", }, { category: "self", summary: "SUSE CVE CVE-2017-17854 page", url: "https://www.suse.com/security/cve/CVE-2017-17854/", }, { category: "self", summary: "SUSE CVE CVE-2017-17855 page", url: "https://www.suse.com/security/cve/CVE-2017-17855/", }, { category: "self", summary: "SUSE CVE CVE-2017-17856 page", url: "https://www.suse.com/security/cve/CVE-2017-17856/", }, { category: "self", summary: "SUSE CVE CVE-2017-17857 page", url: "https://www.suse.com/security/cve/CVE-2017-17857/", }, { category: "self", summary: "SUSE CVE CVE-2017-17862 page", url: "https://www.suse.com/security/cve/CVE-2017-17862/", }, { category: "self", summary: "SUSE CVE CVE-2017-5123 page", url: "https://www.suse.com/security/cve/CVE-2017-5123/", }, { category: "self", summary: "SUSE CVE CVE-2017-5715 page", url: "https://www.suse.com/security/cve/CVE-2017-5715/", }, { category: "self", summary: "SUSE CVE CVE-2017-5753 page", url: "https://www.suse.com/security/cve/CVE-2017-5753/", }, { category: "self", summary: "SUSE CVE CVE-2017-5754 page", url: "https://www.suse.com/security/cve/CVE-2017-5754/", }, { category: "self", summary: "SUSE CVE CVE-2017-7541 page", url: "https://www.suse.com/security/cve/CVE-2017-7541/", }, { category: "self", summary: "SUSE CVE CVE-2017-7542 page", url: "https://www.suse.com/security/cve/CVE-2017-7542/", }, { category: "self", summary: "SUSE CVE CVE-2017-8824 page", url: "https://www.suse.com/security/cve/CVE-2017-8824/", }, { category: "self", summary: "SUSE CVE CVE-2017-8831 page", url: "https://www.suse.com/security/cve/CVE-2017-8831/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000004 page", url: "https://www.suse.com/security/cve/CVE-2018-1000004/", }, { category: "self", summary: "SUSE CVE CVE-2018-10322 page", url: "https://www.suse.com/security/cve/CVE-2018-10322/", }, { category: "self", summary: "SUSE CVE CVE-2018-10323 page", url: "https://www.suse.com/security/cve/CVE-2018-10323/", }, { category: "self", summary: "SUSE CVE CVE-2018-1068 page", url: "https://www.suse.com/security/cve/CVE-2018-1068/", }, { category: "self", summary: "SUSE CVE CVE-2018-1118 page", url: "https://www.suse.com/security/cve/CVE-2018-1118/", }, { category: "self", summary: "SUSE CVE CVE-2018-12232 page", url: "https://www.suse.com/security/cve/CVE-2018-12232/", }, { category: "self", summary: "SUSE CVE CVE-2018-12714 page", url: "https://www.suse.com/security/cve/CVE-2018-12714/", }, { category: "self", summary: "SUSE CVE CVE-2018-13053 page", url: "https://www.suse.com/security/cve/CVE-2018-13053/", }, { category: "self", summary: "SUSE CVE CVE-2018-18710 page", url: "https://www.suse.com/security/cve/CVE-2018-18710/", }, { category: "self", summary: "SUSE CVE CVE-2018-19824 page", url: "https://www.suse.com/security/cve/CVE-2018-19824/", }, { category: "self", summary: "SUSE CVE CVE-2018-5332 page", url: "https://www.suse.com/security/cve/CVE-2018-5332/", }, { category: "self", summary: "SUSE CVE CVE-2018-5333 page", url: "https://www.suse.com/security/cve/CVE-2018-5333/", }, { category: "self", summary: "SUSE CVE CVE-2018-8043 page", url: "https://www.suse.com/security/cve/CVE-2018-8043/", }, { category: "self", summary: "SUSE CVE CVE-2018-8087 page", url: "https://www.suse.com/security/cve/CVE-2018-8087/", }, { category: "self", summary: "SUSE CVE CVE-2018-8822 page", url: "https://www.suse.com/security/cve/CVE-2018-8822/", }, { category: "self", summary: "SUSE CVE CVE-2019-10207 page", url: "https://www.suse.com/security/cve/CVE-2019-10207/", }, { category: "self", summary: "SUSE CVE CVE-2019-11477 page", url: "https://www.suse.com/security/cve/CVE-2019-11477/", }, { category: "self", summary: "SUSE CVE CVE-2019-11478 page", url: "https://www.suse.com/security/cve/CVE-2019-11478/", }, { category: "self", summary: "SUSE CVE CVE-2019-11479 page", url: "https://www.suse.com/security/cve/CVE-2019-11479/", }, { category: "self", summary: "SUSE CVE CVE-2019-14615 page", url: "https://www.suse.com/security/cve/CVE-2019-14615/", }, { category: "self", summary: "SUSE CVE CVE-2019-14814 page", url: "https://www.suse.com/security/cve/CVE-2019-14814/", }, { category: "self", summary: "SUSE CVE CVE-2019-14896 page", url: "https://www.suse.com/security/cve/CVE-2019-14896/", }, { category: "self", summary: "SUSE CVE CVE-2019-15030 page", url: "https://www.suse.com/security/cve/CVE-2019-15030/", }, { category: "self", summary: "SUSE CVE CVE-2019-15031 page", url: "https://www.suse.com/security/cve/CVE-2019-15031/", }, { category: "self", summary: "SUSE CVE CVE-2019-15098 page", url: "https://www.suse.com/security/cve/CVE-2019-15098/", }, { category: "self", summary: "SUSE CVE CVE-2019-15099 page", url: "https://www.suse.com/security/cve/CVE-2019-15099/", }, { category: "self", summary: "SUSE CVE CVE-2019-15290 page", url: "https://www.suse.com/security/cve/CVE-2019-15290/", }, { category: "self", summary: "SUSE CVE CVE-2019-15504 page", url: "https://www.suse.com/security/cve/CVE-2019-15504/", }, { category: "self", summary: "SUSE CVE CVE-2019-15902 page", url: "https://www.suse.com/security/cve/CVE-2019-15902/", }, { category: "self", summary: "SUSE CVE CVE-2019-16231 page", url: "https://www.suse.com/security/cve/CVE-2019-16231/", }, { category: "self", summary: "SUSE CVE CVE-2019-16232 page", url: "https://www.suse.com/security/cve/CVE-2019-16232/", }, { category: "self", summary: "SUSE CVE CVE-2019-16234 page", url: "https://www.suse.com/security/cve/CVE-2019-16234/", }, { category: "self", summary: "SUSE CVE CVE-2019-17133 page", url: "https://www.suse.com/security/cve/CVE-2019-17133/", }, { category: "self", summary: "SUSE CVE CVE-2019-17666 page", url: "https://www.suse.com/security/cve/CVE-2019-17666/", }, { category: "self", summary: "SUSE CVE CVE-2019-18808 page", url: "https://www.suse.com/security/cve/CVE-2019-18808/", }, { category: "self", summary: "SUSE CVE CVE-2019-18812 page", url: "https://www.suse.com/security/cve/CVE-2019-18812/", }, { category: "self", summary: "SUSE CVE CVE-2019-18813 page", url: "https://www.suse.com/security/cve/CVE-2019-18813/", }, { category: "self", summary: "SUSE CVE CVE-2019-19252 page", url: "https://www.suse.com/security/cve/CVE-2019-19252/", }, { category: "self", summary: "SUSE CVE CVE-2019-19332 page", url: "https://www.suse.com/security/cve/CVE-2019-19332/", }, { category: "self", summary: "SUSE CVE CVE-2019-19338 page", url: "https://www.suse.com/security/cve/CVE-2019-19338/", }, { category: "self", summary: "SUSE CVE CVE-2019-3016 page", url: "https://www.suse.com/security/cve/CVE-2019-3016/", }, { category: "self", summary: "SUSE CVE CVE-2019-3846 page", url: "https://www.suse.com/security/cve/CVE-2019-3846/", }, { category: "self", summary: "SUSE CVE CVE-2019-3882 page", url: "https://www.suse.com/security/cve/CVE-2019-3882/", }, { category: "self", summary: "SUSE CVE CVE-2019-3887 page", url: "https://www.suse.com/security/cve/CVE-2019-3887/", }, { category: "self", summary: "SUSE CVE CVE-2019-6974 page", url: "https://www.suse.com/security/cve/CVE-2019-6974/", }, { category: "self", summary: "SUSE CVE CVE-2019-7221 page", url: "https://www.suse.com/security/cve/CVE-2019-7221/", }, { category: "self", summary: "SUSE CVE CVE-2019-7222 page", url: "https://www.suse.com/security/cve/CVE-2019-7222/", }, { category: "self", summary: "SUSE CVE CVE-2019-8564 page", url: "https://www.suse.com/security/cve/CVE-2019-8564/", }, { category: "self", summary: "SUSE CVE CVE-2019-8912 page", url: "https://www.suse.com/security/cve/CVE-2019-8912/", }, { category: "self", summary: "SUSE CVE CVE-2019-9500 page", url: "https://www.suse.com/security/cve/CVE-2019-9500/", }, { category: "self", summary: "SUSE CVE CVE-2020-10135 page", url: "https://www.suse.com/security/cve/CVE-2020-10135/", }, { category: "self", summary: "SUSE CVE CVE-2020-10766 page", url: "https://www.suse.com/security/cve/CVE-2020-10766/", }, { category: "self", summary: "SUSE CVE CVE-2020-10767 page", url: "https://www.suse.com/security/cve/CVE-2020-10767/", }, { category: "self", summary: "SUSE CVE CVE-2020-10768 page", url: "https://www.suse.com/security/cve/CVE-2020-10768/", }, { category: "self", summary: "SUSE CVE CVE-2020-12351 page", url: "https://www.suse.com/security/cve/CVE-2020-12351/", }, { category: "self", summary: "SUSE CVE CVE-2020-12352 page", url: "https://www.suse.com/security/cve/CVE-2020-12352/", }, { category: "self", summary: "SUSE CVE CVE-2020-14331 page", url: "https://www.suse.com/security/cve/CVE-2020-14331/", }, { category: "self", summary: "SUSE CVE CVE-2020-14386 page", url: "https://www.suse.com/security/cve/CVE-2020-14386/", }, { category: "self", summary: "SUSE CVE CVE-2020-24586 page", url: "https://www.suse.com/security/cve/CVE-2020-24586/", }, { category: "self", summary: "SUSE CVE CVE-2020-24587 page", url: "https://www.suse.com/security/cve/CVE-2020-24587/", }, { category: "self", summary: "SUSE CVE CVE-2020-24588 page", url: "https://www.suse.com/security/cve/CVE-2020-24588/", }, { category: "self", summary: "SUSE CVE CVE-2020-25639 page", url: "https://www.suse.com/security/cve/CVE-2020-25639/", }, { category: "self", summary: "SUSE CVE CVE-2020-25656 page", url: "https://www.suse.com/security/cve/CVE-2020-25656/", }, { category: "self", summary: "SUSE CVE CVE-2020-25668 page", url: "https://www.suse.com/security/cve/CVE-2020-25668/", }, { category: "self", summary: "SUSE CVE CVE-2020-26141 page", url: "https://www.suse.com/security/cve/CVE-2020-26141/", }, { category: "self", summary: "SUSE CVE CVE-2020-2732 page", url: "https://www.suse.com/security/cve/CVE-2020-2732/", }, { category: "self", summary: "SUSE CVE CVE-2020-29660 page", url: "https://www.suse.com/security/cve/CVE-2020-29660/", }, { category: "self", summary: "SUSE CVE CVE-2020-29661 page", url: "https://www.suse.com/security/cve/CVE-2020-29661/", }, { category: "self", summary: "SUSE CVE CVE-2020-8648 page", url: "https://www.suse.com/security/cve/CVE-2020-8648/", }, { category: "self", summary: "SUSE CVE CVE-2020-8694 page", url: "https://www.suse.com/security/cve/CVE-2020-8694/", }, { category: "self", summary: "SUSE CVE CVE-2021-23133 page", url: "https://www.suse.com/security/cve/CVE-2021-23133/", }, { category: "self", summary: "SUSE CVE CVE-2021-26708 page", url: "https://www.suse.com/security/cve/CVE-2021-26708/", }, { category: "self", summary: "SUSE CVE CVE-2021-28971 page", url: "https://www.suse.com/security/cve/CVE-2021-28971/", }, { category: "self", summary: "SUSE CVE CVE-2021-32606 page", url: "https://www.suse.com/security/cve/CVE-2021-32606/", }, { category: "self", summary: "SUSE CVE CVE-2021-33909 page", url: "https://www.suse.com/security/cve/CVE-2021-33909/", }, { category: "self", summary: "SUSE CVE CVE-2021-3483 page", url: "https://www.suse.com/security/cve/CVE-2021-3483/", }, { category: "self", summary: "SUSE CVE CVE-2021-3489 page", url: "https://www.suse.com/security/cve/CVE-2021-3489/", }, { category: "self", summary: "SUSE CVE CVE-2021-3490 page", url: "https://www.suse.com/security/cve/CVE-2021-3490/", }, { category: "self", summary: "SUSE CVE CVE-2021-3491 page", url: "https://www.suse.com/security/cve/CVE-2021-3491/", }, { category: "self", summary: "SUSE CVE CVE-2021-3542 page", url: "https://www.suse.com/security/cve/CVE-2021-3542/", }, { category: "self", summary: "SUSE CVE CVE-2021-3640 page", url: "https://www.suse.com/security/cve/CVE-2021-3640/", }, { category: "self", summary: "SUSE CVE CVE-2021-3653 page", url: "https://www.suse.com/security/cve/CVE-2021-3653/", }, { category: "self", summary: "SUSE CVE CVE-2021-3656 page", url: "https://www.suse.com/security/cve/CVE-2021-3656/", }, { category: "self", summary: "SUSE CVE CVE-2021-3744 page", url: "https://www.suse.com/security/cve/CVE-2021-3744/", }, { category: "self", summary: "SUSE CVE CVE-2021-3753 page", url: "https://www.suse.com/security/cve/CVE-2021-3753/", }, { category: "self", summary: "SUSE CVE CVE-2021-37576 page", url: "https://www.suse.com/security/cve/CVE-2021-37576/", }, { category: "self", summary: "SUSE CVE CVE-2021-3759 page", url: "https://www.suse.com/security/cve/CVE-2021-3759/", }, { category: "self", summary: "SUSE CVE CVE-2021-38166 page", url: "https://www.suse.com/security/cve/CVE-2021-38166/", }, { category: "self", summary: "SUSE CVE CVE-2021-43976 page", url: "https://www.suse.com/security/cve/CVE-2021-43976/", }, { category: "self", summary: "SUSE CVE CVE-2022-0185 page", url: "https://www.suse.com/security/cve/CVE-2022-0185/", }, { category: "self", summary: "SUSE CVE CVE-2022-0330 page", url: "https://www.suse.com/security/cve/CVE-2022-0330/", }, { category: "self", summary: "SUSE CVE CVE-2022-0847 page", url: "https://www.suse.com/security/cve/CVE-2022-0847/", }, { category: "self", summary: "SUSE CVE CVE-2022-0886 page", url: "https://www.suse.com/security/cve/CVE-2022-0886/", }, { category: "self", summary: "SUSE CVE CVE-2022-1462 page", url: "https://www.suse.com/security/cve/CVE-2022-1462/", }, { category: "self", summary: "SUSE CVE CVE-2022-1516 page", url: "https://www.suse.com/security/cve/CVE-2022-1516/", }, { category: "self", summary: "SUSE CVE CVE-2022-1679 page", url: "https://www.suse.com/security/cve/CVE-2022-1679/", }, { category: "self", summary: "SUSE CVE CVE-2022-1729 page", url: "https://www.suse.com/security/cve/CVE-2022-1729/", }, { category: "self", summary: "SUSE CVE CVE-2022-1852 page", url: "https://www.suse.com/security/cve/CVE-2022-1852/", }, { category: "self", summary: "SUSE CVE CVE-2022-1966 page", url: "https://www.suse.com/security/cve/CVE-2022-1966/", }, { category: "self", summary: "SUSE CVE CVE-2022-1972 page", url: "https://www.suse.com/security/cve/CVE-2022-1972/", }, { category: "self", summary: "SUSE CVE CVE-2022-1973 page", url: "https://www.suse.com/security/cve/CVE-2022-1973/", }, { category: "self", summary: "SUSE CVE CVE-2022-22942 page", url: "https://www.suse.com/security/cve/CVE-2022-22942/", }, { category: "self", summary: "SUSE CVE CVE-2022-2308 page", url: "https://www.suse.com/security/cve/CVE-2022-2308/", }, { category: "self", summary: "SUSE CVE CVE-2022-24958 page", url: "https://www.suse.com/security/cve/CVE-2022-24958/", }, { category: "self", summary: "SUSE CVE CVE-2022-2588 page", url: "https://www.suse.com/security/cve/CVE-2022-2588/", }, { category: "self", summary: "SUSE CVE CVE-2022-2590 page", url: "https://www.suse.com/security/cve/CVE-2022-2590/", }, { category: "self", summary: "SUSE CVE CVE-2022-26490 page", url: "https://www.suse.com/security/cve/CVE-2022-26490/", }, { category: "self", summary: "SUSE CVE CVE-2022-28388 page", url: "https://www.suse.com/security/cve/CVE-2022-28388/", }, { category: "self", summary: "SUSE CVE CVE-2022-28389 page", url: "https://www.suse.com/security/cve/CVE-2022-28389/", }, { category: "self", summary: "SUSE CVE CVE-2022-28390 page", url: "https://www.suse.com/security/cve/CVE-2022-28390/", }, { category: "self", summary: "SUSE CVE CVE-2022-28893 page", url: "https://www.suse.com/security/cve/CVE-2022-28893/", }, { category: "self", summary: "SUSE CVE CVE-2022-29900 page", url: "https://www.suse.com/security/cve/CVE-2022-29900/", }, { category: "self", summary: "SUSE CVE CVE-2022-29901 page", url: "https://www.suse.com/security/cve/CVE-2022-29901/", }, { category: "self", summary: "SUSE CVE CVE-2022-29968 page", url: "https://www.suse.com/security/cve/CVE-2022-29968/", }, { category: "self", summary: "SUSE CVE CVE-2022-3424 page", url: "https://www.suse.com/security/cve/CVE-2022-3424/", }, { category: "self", summary: "SUSE CVE CVE-2022-34918 page", url: "https://www.suse.com/security/cve/CVE-2022-34918/", }, { category: "self", summary: "SUSE CVE CVE-2022-3628 page", url: "https://www.suse.com/security/cve/CVE-2022-3628/", }, { category: "self", summary: "SUSE CVE CVE-2022-3640 page", url: "https://www.suse.com/security/cve/CVE-2022-3640/", }, { category: "self", summary: "SUSE CVE CVE-2022-40982 page", url: "https://www.suse.com/security/cve/CVE-2022-40982/", }, { category: "self", summary: "SUSE CVE CVE-2022-41218 page", url: "https://www.suse.com/security/cve/CVE-2022-41218/", }, { category: "self", summary: "SUSE CVE CVE-2022-41674 page", url: "https://www.suse.com/security/cve/CVE-2022-41674/", }, { category: "self", summary: "SUSE CVE CVE-2022-42719 page", url: "https://www.suse.com/security/cve/CVE-2022-42719/", }, { category: "self", summary: "SUSE CVE CVE-2022-42720 page", url: "https://www.suse.com/security/cve/CVE-2022-42720/", }, { category: "self", summary: "SUSE CVE CVE-2022-42721 page", url: "https://www.suse.com/security/cve/CVE-2022-42721/", }, { category: "self", summary: "SUSE CVE CVE-2022-42722 page", url: "https://www.suse.com/security/cve/CVE-2022-42722/", }, { category: "self", summary: "SUSE CVE CVE-2022-4379 page", url: "https://www.suse.com/security/cve/CVE-2022-4379/", }, { category: "self", summary: "SUSE CVE CVE-2022-44032 page", url: "https://www.suse.com/security/cve/CVE-2022-44032/", }, { category: "self", summary: "SUSE CVE CVE-2022-44033 page", url: "https://www.suse.com/security/cve/CVE-2022-44033/", }, { category: "self", summary: "SUSE CVE CVE-2022-44034 page", url: "https://www.suse.com/security/cve/CVE-2022-44034/", }, { category: "self", summary: "SUSE CVE CVE-2022-45884 page", url: "https://www.suse.com/security/cve/CVE-2022-45884/", }, { category: "self", summary: "SUSE CVE CVE-2022-45885 page", url: "https://www.suse.com/security/cve/CVE-2022-45885/", }, { category: "self", summary: "SUSE CVE CVE-2022-45886 page", url: "https://www.suse.com/security/cve/CVE-2022-45886/", }, { category: "self", summary: "SUSE CVE CVE-2022-45887 page", url: "https://www.suse.com/security/cve/CVE-2022-45887/", }, { category: "self", summary: "SUSE CVE CVE-2022-45888 page", url: "https://www.suse.com/security/cve/CVE-2022-45888/", }, { category: "self", summary: "SUSE CVE CVE-2022-45919 page", url: "https://www.suse.com/security/cve/CVE-2022-45919/", }, { category: "self", summary: "SUSE CVE CVE-2022-45934 page", url: "https://www.suse.com/security/cve/CVE-2022-45934/", }, { category: "self", summary: "SUSE CVE CVE-2023-0045 page", url: "https://www.suse.com/security/cve/CVE-2023-0045/", }, { category: "self", summary: "SUSE CVE CVE-2023-1076 page", url: "https://www.suse.com/security/cve/CVE-2023-1076/", }, { category: "self", summary: "SUSE CVE CVE-2023-1078 page", url: "https://www.suse.com/security/cve/CVE-2023-1078/", }, { category: "self", summary: "SUSE CVE CVE-2023-1192 page", url: "https://www.suse.com/security/cve/CVE-2023-1192/", }, { category: "self", summary: "SUSE CVE CVE-2023-1380 page", url: "https://www.suse.com/security/cve/CVE-2023-1380/", }, { category: "self", summary: "SUSE CVE CVE-2023-20569 page", url: "https://www.suse.com/security/cve/CVE-2023-20569/", }, { category: "self", summary: "SUSE CVE CVE-2023-20593 page", url: "https://www.suse.com/security/cve/CVE-2023-20593/", }, { category: "self", summary: "SUSE CVE CVE-2023-2124 page", url: "https://www.suse.com/security/cve/CVE-2023-2124/", }, { category: "self", summary: "SUSE CVE CVE-2023-31084 page", url: "https://www.suse.com/security/cve/CVE-2023-31084/", }, { category: "self", summary: "SUSE CVE CVE-2023-3141 page", url: "https://www.suse.com/security/cve/CVE-2023-3141/", }, { category: "self", summary: "SUSE CVE CVE-2023-3269 page", url: "https://www.suse.com/security/cve/CVE-2023-3269/", }, { category: "self", summary: "SUSE CVE CVE-2023-39192 page", url: "https://www.suse.com/security/cve/CVE-2023-39192/", }, { category: "self", summary: "SUSE CVE CVE-2023-39193 page", url: "https://www.suse.com/security/cve/CVE-2023-39193/", }, { category: "self", summary: "SUSE CVE CVE-2023-4128 page", url: "https://www.suse.com/security/cve/CVE-2023-4128/", }, { category: "self", summary: "SUSE CVE CVE-2023-4134 page", url: "https://www.suse.com/security/cve/CVE-2023-4134/", }, { category: "self", summary: "SUSE CVE CVE-2023-4194 page", url: "https://www.suse.com/security/cve/CVE-2023-4194/", }, { category: "self", summary: "SUSE CVE CVE-2023-42753 page", url: "https://www.suse.com/security/cve/CVE-2023-42753/", }, { category: "self", summary: "SUSE CVE CVE-2023-42754 page", url: "https://www.suse.com/security/cve/CVE-2023-42754/", }, { category: "self", summary: "SUSE CVE CVE-2023-42756 page", url: "https://www.suse.com/security/cve/CVE-2023-42756/", }, { category: "self", summary: "SUSE CVE CVE-2023-4623 page", url: "https://www.suse.com/security/cve/CVE-2023-4623/", }, { category: "self", summary: "SUSE CVE CVE-2023-46813 page", url: "https://www.suse.com/security/cve/CVE-2023-46813/", }, { category: "self", summary: "SUSE CVE CVE-2023-4881 page", url: "https://www.suse.com/security/cve/CVE-2023-4881/", }, { category: "self", summary: "SUSE CVE CVE-2023-5345 page", url: "https://www.suse.com/security/cve/CVE-2023-5345/", }, { category: "self", summary: "SUSE CVE CVE-2023-6606 page", url: "https://www.suse.com/security/cve/CVE-2023-6606/", }, { category: "self", summary: "SUSE CVE CVE-2023-6610 page", url: "https://www.suse.com/security/cve/CVE-2023-6610/", }, ], title: "kernel-devel-longterm-6.6.17-1.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:13704-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-longterm-6.6.17-1.1.aarch64", product: { name: "kernel-devel-longterm-6.6.17-1.1.aarch64", product_id: "kernel-devel-longterm-6.6.17-1.1.aarch64", }, }, { category: "product_version", name: "kernel-source-longterm-6.6.17-1.1.aarch64", product: { name: "kernel-source-longterm-6.6.17-1.1.aarch64", product_id: "kernel-source-longterm-6.6.17-1.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-longterm-6.6.17-1.1.ppc64le", product: { name: "kernel-devel-longterm-6.6.17-1.1.ppc64le", product_id: "kernel-devel-longterm-6.6.17-1.1.ppc64le", }, }, { category: "product_version", name: "kernel-source-longterm-6.6.17-1.1.ppc64le", product: { name: "kernel-source-longterm-6.6.17-1.1.ppc64le", product_id: "kernel-source-longterm-6.6.17-1.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kernel-devel-longterm-6.6.17-1.1.s390x", product: { name: "kernel-devel-longterm-6.6.17-1.1.s390x", product_id: "kernel-devel-longterm-6.6.17-1.1.s390x", }, }, { category: "product_version", name: "kernel-source-longterm-6.6.17-1.1.s390x", product: { name: "kernel-source-longterm-6.6.17-1.1.s390x", product_id: "kernel-source-longterm-6.6.17-1.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "kernel-devel-longterm-6.6.17-1.1.x86_64", product: { name: "kernel-devel-longterm-6.6.17-1.1.x86_64", product_id: "kernel-devel-longterm-6.6.17-1.1.x86_64", }, }, { category: "product_version", name: "kernel-source-longterm-6.6.17-1.1.x86_64", product: { name: "kernel-source-longterm-6.6.17-1.1.x86_64", product_id: "kernel-source-longterm-6.6.17-1.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-devel-longterm-6.6.17-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", }, product_reference: "kernel-devel-longterm-6.6.17-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-longterm-6.6.17-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", }, product_reference: "kernel-devel-longterm-6.6.17-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-longterm-6.6.17-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", }, product_reference: "kernel-devel-longterm-6.6.17-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-longterm-6.6.17-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", }, product_reference: "kernel-devel-longterm-6.6.17-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-source-longterm-6.6.17-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", }, product_reference: "kernel-source-longterm-6.6.17-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-source-longterm-6.6.17-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", }, product_reference: "kernel-source-longterm-6.6.17-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-source-longterm-6.6.17-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", }, product_reference: "kernel-source-longterm-6.6.17-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-source-longterm-6.6.17-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", }, product_reference: "kernel-source-longterm-6.6.17-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2016-3695", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3695", }, ], notes: [ { category: "general", text: "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3695", url: "https://www.suse.com/security/cve/CVE-2016-3695", }, { category: "external", summary: "SUSE Bug 1023051 for CVE-2016-3695", url: "https://bugzilla.suse.com/1023051", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2016-3695", }, { cve: "CVE-2017-1000251", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000251", }, ], notes: [ { category: "general", text: "The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000251", url: "https://www.suse.com/security/cve/CVE-2017-1000251", }, { category: "external", summary: "SUSE Bug 1057389 for CVE-2017-1000251", url: "https://bugzilla.suse.com/1057389", }, { category: "external", summary: "SUSE Bug 1057950 for CVE-2017-1000251", url: "https://bugzilla.suse.com/1057950", }, { category: "external", summary: "SUSE Bug 1070535 for CVE-2017-1000251", url: "https://bugzilla.suse.com/1070535", }, { category: "external", summary: "SUSE Bug 1072117 for CVE-2017-1000251", url: "https://bugzilla.suse.com/1072117", }, { category: "external", summary: "SUSE Bug 1072162 for CVE-2017-1000251", url: "https://bugzilla.suse.com/1072162", }, { category: "external", summary: "SUSE Bug 1120758 for CVE-2017-1000251", url: "https://bugzilla.suse.com/1120758", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-1000251", }, { cve: "CVE-2017-12153", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12153", }, ], notes: [ { category: "general", text: "A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12153", url: "https://www.suse.com/security/cve/CVE-2017-12153", }, { category: "external", summary: "SUSE Bug 1058410 for CVE-2017-12153", url: "https://bugzilla.suse.com/1058410", }, { category: "external", summary: "SUSE Bug 1058624 for CVE-2017-12153", url: "https://bugzilla.suse.com/1058624", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-12153", }, { cve: "CVE-2017-13080", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-13080", }, ], notes: [ { category: "general", text: "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-13080", url: "https://www.suse.com/security/cve/CVE-2017-13080", }, { category: "external", summary: "SUSE Bug 1056061 for CVE-2017-13080", url: "https://bugzilla.suse.com/1056061", }, { category: "external", summary: "SUSE Bug 1063479 for CVE-2017-13080", url: "https://bugzilla.suse.com/1063479", }, { category: "external", summary: "SUSE Bug 1063667 for CVE-2017-13080", url: "https://bugzilla.suse.com/1063667", }, { category: "external", summary: "SUSE Bug 1063671 for CVE-2017-13080", url: "https://bugzilla.suse.com/1063671", }, { category: "external", summary: "SUSE Bug 1066295 for CVE-2017-13080", url: "https://bugzilla.suse.com/1066295", }, { category: "external", summary: "SUSE Bug 1105108 for CVE-2017-13080", url: "https://bugzilla.suse.com/1105108", }, { category: "external", summary: "SUSE Bug 1178872 for CVE-2017-13080", url: "https://bugzilla.suse.com/1178872", }, { category: "external", summary: "SUSE Bug 1179588 for CVE-2017-13080", url: "https://bugzilla.suse.com/1179588", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-13080", }, { cve: "CVE-2017-14051", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14051", }, ], notes: [ { category: "general", text: "An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14051", url: "https://www.suse.com/security/cve/CVE-2017-14051", }, { category: "external", summary: "SUSE Bug 1056588 for CVE-2017-14051", url: "https://bugzilla.suse.com/1056588", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-14051", }, { cve: "CVE-2017-15129", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15129", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15129", url: "https://www.suse.com/security/cve/CVE-2017-15129", }, { category: "external", summary: "SUSE Bug 1074839 for CVE-2017-15129", url: "https://bugzilla.suse.com/1074839", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-15129", }, { cve: "CVE-2017-15265", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15265", }, ], notes: [ { category: "general", text: "Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15265", url: "https://www.suse.com/security/cve/CVE-2017-15265", }, { category: "external", summary: "SUSE Bug 1062520 for CVE-2017-15265", url: "https://bugzilla.suse.com/1062520", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2017-15265", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-15265", }, { cve: "CVE-2017-16536", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16536", }, ], notes: [ { category: "general", text: "The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16536", url: "https://www.suse.com/security/cve/CVE-2017-16536", }, { category: "external", summary: "SUSE Bug 1066606 for CVE-2017-16536", url: "https://bugzilla.suse.com/1066606", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2017-16536", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2017-16536", url: "https://bugzilla.suse.com/1146519", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-16536", }, { cve: "CVE-2017-16537", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16537", }, ], notes: [ { category: "general", text: "The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16537", url: "https://www.suse.com/security/cve/CVE-2017-16537", }, { category: "external", summary: "SUSE Bug 1066573 for CVE-2017-16537", url: "https://bugzilla.suse.com/1066573", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2017-16537", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2017-16537", url: "https://bugzilla.suse.com/1146519", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-16537", }, { cve: "CVE-2017-16645", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16645", }, ], notes: [ { category: "general", text: "The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16645", url: "https://www.suse.com/security/cve/CVE-2017-16645", }, { category: "external", summary: "SUSE Bug 1067132 for CVE-2017-16645", url: "https://bugzilla.suse.com/1067132", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2017-16645", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2017-16645", url: "https://bugzilla.suse.com/1146519", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-16645", }, { cve: "CVE-2017-16646", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16646", }, ], notes: [ { category: "general", text: "drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16646", url: "https://www.suse.com/security/cve/CVE-2017-16646", }, { category: "external", summary: "SUSE Bug 1067105 for CVE-2017-16646", url: "https://bugzilla.suse.com/1067105", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2017-16646", url: "https://bugzilla.suse.com/1146519", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-16646", }, { cve: "CVE-2017-16647", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16647", }, ], notes: [ { category: "general", text: "drivers/net/usb/asix_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16647", url: "https://www.suse.com/security/cve/CVE-2017-16647", }, { category: "external", summary: "SUSE Bug 1067102 for CVE-2017-16647", url: "https://bugzilla.suse.com/1067102", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2017-16647", url: "https://bugzilla.suse.com/1146519", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-16647", }, { cve: "CVE-2017-16648", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16648", }, ], notes: [ { category: "general", text: "The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16648", url: "https://www.suse.com/security/cve/CVE-2017-16648", }, { category: "external", summary: "SUSE Bug 1067087 for CVE-2017-16648", url: "https://bugzilla.suse.com/1067087", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2017-16648", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2017-16648", url: "https://bugzilla.suse.com/1146519", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-16648", }, { cve: "CVE-2017-16995", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16995", }, ], notes: [ { category: "general", text: "The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16995", url: "https://www.suse.com/security/cve/CVE-2017-16995", }, { category: "external", summary: "SUSE Bug 1073928 for CVE-2017-16995", url: "https://bugzilla.suse.com/1073928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-16995", }, { cve: "CVE-2017-16996", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16996", }, ], notes: [ { category: "general", text: "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16996", url: "https://www.suse.com/security/cve/CVE-2017-16996", }, { category: "external", summary: "SUSE Bug 1073928 for CVE-2017-16996", url: "https://bugzilla.suse.com/1073928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-16996", }, { cve: "CVE-2017-17448", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17448", }, ], notes: [ { category: "general", text: "net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17448", url: "https://www.suse.com/security/cve/CVE-2017-17448", }, { category: "external", summary: "SUSE Bug 1071693 for CVE-2017-17448", url: "https://bugzilla.suse.com/1071693", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-17448", }, { cve: "CVE-2017-17449", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17449", }, ], notes: [ { category: "general", text: "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17449", url: "https://www.suse.com/security/cve/CVE-2017-17449", }, { category: "external", summary: "SUSE Bug 1071694 for CVE-2017-17449", url: "https://bugzilla.suse.com/1071694", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-17449", }, { cve: "CVE-2017-17450", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17450", }, ], notes: [ { category: "general", text: "net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17450", url: "https://www.suse.com/security/cve/CVE-2017-17450", }, { category: "external", summary: "SUSE Bug 1071695 for CVE-2017-17450", url: "https://bugzilla.suse.com/1071695", }, { category: "external", summary: "SUSE Bug 1074033 for CVE-2017-17450", url: "https://bugzilla.suse.com/1074033", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2017-17450", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-17450", }, { cve: "CVE-2017-17852", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17852", }, ], notes: [ { category: "general", text: "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of 32-bit ALU ops.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17852", url: "https://www.suse.com/security/cve/CVE-2017-17852", }, { category: "external", summary: "SUSE Bug 1073928 for CVE-2017-17852", url: "https://bugzilla.suse.com/1073928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-17852", }, { cve: "CVE-2017-17853", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17853", }, ], notes: [ { category: "general", text: "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17853", url: "https://www.suse.com/security/cve/CVE-2017-17853", }, { category: "external", summary: "SUSE Bug 1073928 for CVE-2017-17853", url: "https://bugzilla.suse.com/1073928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-17853", }, { cve: "CVE-2017-17854", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17854", }, ], notes: [ { category: "general", text: "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmetic.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17854", url: "https://www.suse.com/security/cve/CVE-2017-17854", }, { category: "external", summary: "SUSE Bug 1073928 for CVE-2017-17854", url: "https://bugzilla.suse.com/1073928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-17854", }, { cve: "CVE-2017-17855", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17855", }, ], notes: [ { category: "general", text: "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging improper use of pointers in place of scalars.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17855", url: "https://www.suse.com/security/cve/CVE-2017-17855", }, { category: "external", summary: "SUSE Bug 1073928 for CVE-2017-17855", url: "https://bugzilla.suse.com/1073928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-17855", }, { cve: "CVE-2017-17856", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17856", }, ], notes: [ { category: "general", text: "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the lack of stack-pointer alignment enforcement.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17856", url: "https://www.suse.com/security/cve/CVE-2017-17856", }, { category: "external", summary: "SUSE Bug 1073928 for CVE-2017-17856", url: "https://bugzilla.suse.com/1073928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-17856", }, { cve: "CVE-2017-17857", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17857", }, ], notes: [ { category: "general", text: "The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17857", url: "https://www.suse.com/security/cve/CVE-2017-17857", }, { category: "external", summary: "SUSE Bug 1073928 for CVE-2017-17857", url: "https://bugzilla.suse.com/1073928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-17857", }, { cve: "CVE-2017-17862", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17862", }, ], notes: [ { category: "general", text: "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17862", url: "https://www.suse.com/security/cve/CVE-2017-17862", }, { category: "external", summary: "SUSE Bug 1073928 for CVE-2017-17862", url: "https://bugzilla.suse.com/1073928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-17862", }, { cve: "CVE-2017-5123", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-5123", }, ], notes: [ { category: "general", text: "Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-5123", url: "https://www.suse.com/security/cve/CVE-2017-5123", }, { category: "external", summary: "SUSE Bug 1062473 for CVE-2017-5123", url: "https://bugzilla.suse.com/1062473", }, { category: "external", summary: "SUSE Bug 1122971 for CVE-2017-5123", url: "https://bugzilla.suse.com/1122971", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-5123", }, { cve: "CVE-2017-5715", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-5715", }, ], notes: [ { category: "general", text: "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-5715", url: "https://www.suse.com/security/cve/CVE-2017-5715", }, { category: "external", summary: "SUSE Bug 1068032 for CVE-2017-5715", url: "https://bugzilla.suse.com/1068032", }, { category: "external", summary: "SUSE Bug 1074562 for CVE-2017-5715", url: "https://bugzilla.suse.com/1074562", }, { category: "external", summary: "SUSE Bug 1074578 for CVE-2017-5715", url: "https://bugzilla.suse.com/1074578", }, { category: "external", summary: "SUSE Bug 1074701 for CVE-2017-5715", url: "https://bugzilla.suse.com/1074701", }, { category: "external", summary: "SUSE Bug 1074741 for CVE-2017-5715", url: "https://bugzilla.suse.com/1074741", }, { category: "external", summary: "SUSE Bug 1074919 for CVE-2017-5715", url: "https://bugzilla.suse.com/1074919", }, { category: "external", summary: "SUSE Bug 1075006 for CVE-2017-5715", url: "https://bugzilla.suse.com/1075006", }, { category: "external", summary: "SUSE Bug 1075007 for CVE-2017-5715", url: "https://bugzilla.suse.com/1075007", }, { category: "external", summary: "SUSE Bug 1075262 for CVE-2017-5715", url: "https://bugzilla.suse.com/1075262", }, { category: "external", summary: "SUSE Bug 1075419 for CVE-2017-5715", url: "https://bugzilla.suse.com/1075419", }, { category: "external", summary: "SUSE Bug 1076115 for CVE-2017-5715", url: "https://bugzilla.suse.com/1076115", }, { category: "external", summary: "SUSE Bug 1076372 for CVE-2017-5715", url: "https://bugzilla.suse.com/1076372", }, { category: "external", summary: "SUSE Bug 1076606 for CVE-2017-5715", url: "https://bugzilla.suse.com/1076606", }, { category: "external", summary: "SUSE Bug 1078353 for CVE-2017-5715", url: "https://bugzilla.suse.com/1078353", }, { category: "external", summary: "SUSE Bug 1080039 for CVE-2017-5715", url: "https://bugzilla.suse.com/1080039", }, { category: "external", summary: "SUSE Bug 1087887 for CVE-2017-5715", url: "https://bugzilla.suse.com/1087887", }, { category: "external", summary: "SUSE Bug 1087939 for CVE-2017-5715", url: "https://bugzilla.suse.com/1087939", }, { category: "external", summary: "SUSE Bug 1088147 for CVE-2017-5715", url: "https://bugzilla.suse.com/1088147", }, { category: "external", summary: "SUSE Bug 1089055 for CVE-2017-5715", url: "https://bugzilla.suse.com/1089055", }, { category: "external", summary: "SUSE Bug 1091815 for CVE-2017-5715", url: "https://bugzilla.suse.com/1091815", }, { category: "external", summary: "SUSE Bug 1095735 for CVE-2017-5715", url: "https://bugzilla.suse.com/1095735", }, { category: "external", summary: "SUSE Bug 1102517 for CVE-2017-5715", url: "https://bugzilla.suse.com/1102517", }, { category: "external", summary: "SUSE Bug 1105108 for CVE-2017-5715", url: "https://bugzilla.suse.com/1105108", }, { category: "external", summary: "SUSE Bug 1126516 for CVE-2017-5715", url: "https://bugzilla.suse.com/1126516", }, { category: "external", summary: "SUSE Bug 1173489 for CVE-2017-5715", url: "https://bugzilla.suse.com/1173489", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2017-5715", url: "https://bugzilla.suse.com/1178658", }, { category: "external", summary: "SUSE Bug 1201457 for CVE-2017-5715", url: "https://bugzilla.suse.com/1201457", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2017-5715", url: "https://bugzilla.suse.com/1201877", }, { category: "external", summary: "SUSE Bug 1203236 for CVE-2017-5715", url: "https://bugzilla.suse.com/1203236", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-5715", }, { cve: "CVE-2017-5753", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-5753", }, ], notes: [ { category: "general", text: "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-5753", url: "https://www.suse.com/security/cve/CVE-2017-5753", }, { category: "external", summary: "SUSE Bug 1068032 for CVE-2017-5753", url: "https://bugzilla.suse.com/1068032", }, { category: "external", summary: "SUSE Bug 1074562 for CVE-2017-5753", url: "https://bugzilla.suse.com/1074562", }, { category: "external", summary: "SUSE Bug 1074578 for CVE-2017-5753", url: "https://bugzilla.suse.com/1074578", }, { category: "external", summary: "SUSE Bug 1074701 for CVE-2017-5753", url: "https://bugzilla.suse.com/1074701", }, { category: "external", summary: "SUSE Bug 1075006 for CVE-2017-5753", url: "https://bugzilla.suse.com/1075006", }, { category: "external", summary: "SUSE Bug 1075419 for CVE-2017-5753", url: "https://bugzilla.suse.com/1075419", }, { category: "external", summary: "SUSE Bug 1075748 for CVE-2017-5753", url: "https://bugzilla.suse.com/1075748", }, { category: "external", summary: "SUSE Bug 1080039 for CVE-2017-5753", url: "https://bugzilla.suse.com/1080039", }, { category: "external", summary: "SUSE Bug 1087084 for CVE-2017-5753", url: "https://bugzilla.suse.com/1087084", }, { category: "external", summary: "SUSE Bug 1087939 for CVE-2017-5753", url: "https://bugzilla.suse.com/1087939", }, { category: "external", summary: "SUSE Bug 1089055 for CVE-2017-5753", url: "https://bugzilla.suse.com/1089055", }, { category: "external", summary: "SUSE Bug 1136865 for CVE-2017-5753", url: "https://bugzilla.suse.com/1136865", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2017-5753", url: "https://bugzilla.suse.com/1178658", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2017-5753", url: "https://bugzilla.suse.com/1201877", }, { category: "external", summary: "SUSE Bug 1209547 for CVE-2017-5753", url: "https://bugzilla.suse.com/1209547", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-5753", }, { cve: "CVE-2017-5754", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-5754", }, ], notes: [ { category: "general", text: "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-5754", url: "https://www.suse.com/security/cve/CVE-2017-5754", }, { category: "external", summary: "SUSE Bug 1068032 for CVE-2017-5754", url: "https://bugzilla.suse.com/1068032", }, { category: "external", summary: "SUSE Bug 1074562 for CVE-2017-5754", url: "https://bugzilla.suse.com/1074562", }, { category: "external", summary: "SUSE Bug 1074578 for CVE-2017-5754", url: "https://bugzilla.suse.com/1074578", }, { category: "external", summary: "SUSE Bug 1074701 for CVE-2017-5754", url: "https://bugzilla.suse.com/1074701", }, { category: "external", summary: "SUSE Bug 1075006 for CVE-2017-5754", url: "https://bugzilla.suse.com/1075006", }, { category: "external", summary: "SUSE Bug 1075008 for CVE-2017-5754", url: "https://bugzilla.suse.com/1075008", }, { category: "external", summary: "SUSE Bug 1087939 for CVE-2017-5754", url: "https://bugzilla.suse.com/1087939", }, { category: "external", summary: "SUSE Bug 1089055 for CVE-2017-5754", url: "https://bugzilla.suse.com/1089055", }, { category: "external", summary: "SUSE Bug 1115045 for CVE-2017-5754", url: "https://bugzilla.suse.com/1115045", }, { category: "external", summary: "SUSE Bug 1136865 for CVE-2017-5754", url: "https://bugzilla.suse.com/1136865", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2017-5754", url: "https://bugzilla.suse.com/1178658", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2017-5754", url: "https://bugzilla.suse.com/1201877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-5754", }, { cve: "CVE-2017-7541", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7541", }, ], notes: [ { category: "general", text: "The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7541", url: "https://www.suse.com/security/cve/CVE-2017-7541", }, { category: "external", summary: "SUSE Bug 1049645 for CVE-2017-7541", url: "https://bugzilla.suse.com/1049645", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-7541", }, { cve: "CVE-2017-7542", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7542", }, ], notes: [ { category: "general", text: "The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7542", url: "https://www.suse.com/security/cve/CVE-2017-7542", }, { category: "external", summary: "SUSE Bug 1049882 for CVE-2017-7542", url: "https://bugzilla.suse.com/1049882", }, { category: "external", summary: "SUSE Bug 1061936 for CVE-2017-7542", url: "https://bugzilla.suse.com/1061936", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-7542", }, { cve: "CVE-2017-8824", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8824", }, ], notes: [ { category: "general", text: "The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8824", url: "https://www.suse.com/security/cve/CVE-2017-8824", }, { category: "external", summary: "SUSE Bug 1070771 for CVE-2017-8824", url: "https://bugzilla.suse.com/1070771", }, { category: "external", summary: "SUSE Bug 1076734 for CVE-2017-8824", url: "https://bugzilla.suse.com/1076734", }, { category: "external", summary: "SUSE Bug 1092904 for CVE-2017-8824", url: "https://bugzilla.suse.com/1092904", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2017-8824", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-8824", }, { cve: "CVE-2017-8831", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8831", }, ], notes: [ { category: "general", text: "The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a \"double fetch\" vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8831", url: "https://www.suse.com/security/cve/CVE-2017-8831", }, { category: "external", summary: "SUSE Bug 1037994 for CVE-2017-8831", url: "https://bugzilla.suse.com/1037994", }, { category: "external", summary: "SUSE Bug 1061936 for CVE-2017-8831", url: "https://bugzilla.suse.com/1061936", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2017-8831", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2017-8831", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-8831", }, { cve: "CVE-2018-1000004", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000004", }, ], notes: [ { category: "general", text: "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000004", url: "https://www.suse.com/security/cve/CVE-2018-1000004", }, { category: "external", summary: "SUSE Bug 1076017 for CVE-2018-1000004", url: "https://bugzilla.suse.com/1076017", }, { category: "external", summary: "SUSE Bug 1091815 for CVE-2018-1000004", url: "https://bugzilla.suse.com/1091815", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-1000004", }, { cve: "CVE-2018-10322", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10322", }, ], notes: [ { category: "general", text: "The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10322", url: "https://www.suse.com/security/cve/CVE-2018-10322", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10322", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1090749 for CVE-2018-10322", url: "https://bugzilla.suse.com/1090749", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-10322", }, { cve: "CVE-2018-10323", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10323", }, ], notes: [ { category: "general", text: "The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10323", url: "https://www.suse.com/security/cve/CVE-2018-10323", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10323", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1090717 for CVE-2018-10323", url: "https://bugzilla.suse.com/1090717", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-10323", }, { cve: "CVE-2018-1068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1068", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1068", url: "https://www.suse.com/security/cve/CVE-2018-1068", }, { category: "external", summary: "SUSE Bug 1085107 for CVE-2018-1068", url: "https://bugzilla.suse.com/1085107", }, { category: "external", summary: "SUSE Bug 1085114 for CVE-2018-1068", url: "https://bugzilla.suse.com/1085114", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1068", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1123903 for CVE-2018-1068", url: "https://bugzilla.suse.com/1123903", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-1068", }, { cve: "CVE-2018-1118", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1118", }, ], notes: [ { category: "general", text: "Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1118", url: "https://www.suse.com/security/cve/CVE-2018-1118", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1118", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092472 for CVE-2018-1118", url: "https://bugzilla.suse.com/1092472", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-1118", }, { cve: "CVE-2018-12232", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-12232", }, ], notes: [ { category: "general", text: "In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat's execution, leading to a NULL pointer dereference and system crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-12232", url: "https://www.suse.com/security/cve/CVE-2018-12232", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-12232", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1097593 for CVE-2018-12232", url: "https://bugzilla.suse.com/1097593", }, { category: "external", summary: "SUSE Bug 1125907 for CVE-2018-12232", url: "https://bugzilla.suse.com/1125907", }, { category: "external", summary: "SUSE Bug 1127757 for CVE-2018-12232", url: "https://bugzilla.suse.com/1127757", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-12232", }, { cve: "CVE-2018-12714", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-12714", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial of service (slab out-of-bounds write) or possibly have unspecified other impact via crafted perf_event_open and mmap system calls.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-12714", url: "https://www.suse.com/security/cve/CVE-2018-12714", }, { category: "external", summary: "SUSE Bug 1098933 for CVE-2018-12714", url: "https://bugzilla.suse.com/1098933", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-12714", }, { cve: "CVE-2018-13053", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-13053", }, ], notes: [ { category: "general", text: "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-13053", url: "https://www.suse.com/security/cve/CVE-2018-13053", }, { category: "external", summary: "SUSE Bug 1099924 for CVE-2018-13053", url: "https://bugzilla.suse.com/1099924", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2018-13053", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-13053", }, { cve: "CVE-2018-18710", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18710", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18710", url: "https://www.suse.com/security/cve/CVE-2018-18710", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-18710", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-18710", }, { cve: "CVE-2018-19824", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19824", }, ], notes: [ { category: "general", text: "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19824", url: "https://www.suse.com/security/cve/CVE-2018-19824", }, { category: "external", summary: "SUSE Bug 1118152 for CVE-2018-19824", url: "https://bugzilla.suse.com/1118152", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-19824", }, { cve: "CVE-2018-5332", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-5332", }, ], notes: [ { category: "general", text: "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-5332", url: "https://www.suse.com/security/cve/CVE-2018-5332", }, { category: "external", summary: "SUSE Bug 1075621 for CVE-2018-5332", url: "https://bugzilla.suse.com/1075621", }, { category: "external", summary: "SUSE Bug 1091815 for CVE-2018-5332", url: "https://bugzilla.suse.com/1091815", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2018-5332", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.6, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-5332", }, { cve: "CVE-2018-5333", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-5333", }, ], notes: [ { category: "general", text: "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-5333", url: "https://www.suse.com/security/cve/CVE-2018-5333", }, { category: "external", summary: "SUSE Bug 1075617 for CVE-2018-5333", url: "https://bugzilla.suse.com/1075617", }, { category: "external", summary: "SUSE Bug 1091815 for CVE-2018-5333", url: "https://bugzilla.suse.com/1091815", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.9, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-5333", }, { cve: "CVE-2018-8043", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8043", }, ], notes: [ { category: "general", text: "The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8043", url: "https://www.suse.com/security/cve/CVE-2018-8043", }, { category: "external", summary: "SUSE Bug 1084829 for CVE-2018-8043", url: "https://bugzilla.suse.com/1084829", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 0, baseSeverity: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-8043", }, { cve: "CVE-2018-8087", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8087", }, ], notes: [ { category: "general", text: "Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8087", url: "https://www.suse.com/security/cve/CVE-2018-8087", }, { category: "external", summary: "SUSE Bug 1085053 for CVE-2018-8087", url: "https://bugzilla.suse.com/1085053", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-8087", }, { cve: "CVE-2018-8822", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8822", }, ], notes: [ { category: "general", text: "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8822", url: "https://www.suse.com/security/cve/CVE-2018-8822", }, { category: "external", summary: "SUSE Bug 1086162 for CVE-2018-8822", url: "https://bugzilla.suse.com/1086162", }, { category: "external", summary: "SUSE Bug 1090404 for CVE-2018-8822", url: "https://bugzilla.suse.com/1090404", }, { category: "external", summary: "SUSE Bug 1091815 for CVE-2018-8822", url: "https://bugzilla.suse.com/1091815", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-8822", }, { cve: "CVE-2019-10207", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-10207", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-10207", url: "https://www.suse.com/security/cve/CVE-2019-10207", }, { category: "external", summary: "SUSE Bug 1123959 for CVE-2019-10207", url: "https://bugzilla.suse.com/1123959", }, { category: "external", summary: "SUSE Bug 1142857 for CVE-2019-10207", url: "https://bugzilla.suse.com/1142857", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-10207", }, { cve: "CVE-2019-11477", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-11477", }, ], notes: [ { category: "general", text: "Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-11477", url: "https://www.suse.com/security/cve/CVE-2019-11477", }, { category: "external", summary: "SUSE Bug 1132686 for CVE-2019-11477", url: "https://bugzilla.suse.com/1132686", }, { category: "external", summary: "SUSE Bug 1137586 for CVE-2019-11477", url: "https://bugzilla.suse.com/1137586", }, { category: "external", summary: "SUSE Bug 1142129 for CVE-2019-11477", url: "https://bugzilla.suse.com/1142129", }, { category: "external", summary: "SUSE Bug 1153242 for CVE-2019-11477", url: "https://bugzilla.suse.com/1153242", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.2, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-11477", }, { cve: "CVE-2019-11478", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-11478", }, ], notes: [ { category: "general", text: "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-11478", url: "https://www.suse.com/security/cve/CVE-2019-11478", }, { category: "external", summary: "SUSE Bug 1132686 for CVE-2019-11478", url: "https://bugzilla.suse.com/1132686", }, { category: "external", summary: "SUSE Bug 1137586 for CVE-2019-11478", url: "https://bugzilla.suse.com/1137586", }, { category: "external", summary: "SUSE Bug 1142129 for CVE-2019-11478", url: "https://bugzilla.suse.com/1142129", }, { category: "external", summary: "SUSE Bug 1143542 for CVE-2019-11478", url: "https://bugzilla.suse.com/1143542", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-11478", }, { cve: "CVE-2019-11479", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-11479", }, ], notes: [ { category: "general", text: "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-11479", url: "https://www.suse.com/security/cve/CVE-2019-11479", }, { category: "external", summary: "SUSE Bug 1132686 for CVE-2019-11479", url: "https://bugzilla.suse.com/1132686", }, { category: "external", summary: "SUSE Bug 1137586 for CVE-2019-11479", url: "https://bugzilla.suse.com/1137586", }, { category: "external", summary: "SUSE Bug 1142129 for CVE-2019-11479", url: "https://bugzilla.suse.com/1142129", }, { category: "external", summary: "SUSE Bug 1143542 for CVE-2019-11479", url: "https://bugzilla.suse.com/1143542", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-11479", }, { cve: "CVE-2019-14615", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14615", }, ], notes: [ { category: "general", text: "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14615", url: "https://www.suse.com/security/cve/CVE-2019-14615", }, { category: "external", summary: "SUSE Bug 1160195 for CVE-2019-14615", url: "https://bugzilla.suse.com/1160195", }, { category: "external", summary: "SUSE Bug 1165881 for CVE-2019-14615", url: "https://bugzilla.suse.com/1165881", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-14615", }, { cve: "CVE-2019-14814", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14814", }, ], notes: [ { category: "general", text: "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14814", url: "https://www.suse.com/security/cve/CVE-2019-14814", }, { category: "external", summary: "SUSE Bug 1146512 for CVE-2019-14814", url: "https://bugzilla.suse.com/1146512", }, { category: "external", summary: "SUSE Bug 1173664 for CVE-2019-14814", url: "https://bugzilla.suse.com/1173664", }, { category: "external", summary: "SUSE Bug 1173665 for CVE-2019-14814", url: "https://bugzilla.suse.com/1173665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-14814", }, { cve: "CVE-2019-14896", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14896", }, ], notes: [ { category: "general", text: "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14896", url: "https://www.suse.com/security/cve/CVE-2019-14896", }, { category: "external", summary: "SUSE Bug 1157157 for CVE-2019-14896", url: "https://bugzilla.suse.com/1157157", }, { category: "external", summary: "SUSE Bug 1160468 for CVE-2019-14896", url: "https://bugzilla.suse.com/1160468", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-14896", }, { cve: "CVE-2019-15030", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15030", }, ], notes: [ { category: "general", text: "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15030", url: "https://www.suse.com/security/cve/CVE-2019-15030", }, { category: "external", summary: "SUSE Bug 1149713 for CVE-2019-15030", url: "https://bugzilla.suse.com/1149713", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-15030", }, { cve: "CVE-2019-15031", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15031", }, ], notes: [ { category: "general", text: "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15031", url: "https://www.suse.com/security/cve/CVE-2019-15031", }, { category: "external", summary: "SUSE Bug 1149713 for CVE-2019-15031", url: "https://bugzilla.suse.com/1149713", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-15031", }, { cve: "CVE-2019-15098", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15098", }, ], notes: [ { category: "general", text: "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15098", url: "https://www.suse.com/security/cve/CVE-2019-15098", }, { category: "external", summary: "SUSE Bug 1146378 for CVE-2019-15098", url: "https://bugzilla.suse.com/1146378", }, { category: "external", summary: "SUSE Bug 1146543 for CVE-2019-15098", url: "https://bugzilla.suse.com/1146543", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-15098", }, { cve: "CVE-2019-15099", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15099", }, ], notes: [ { category: "general", text: "drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15099", url: "https://www.suse.com/security/cve/CVE-2019-15099", }, { category: "external", summary: "SUSE Bug 1146368 for CVE-2019-15099", url: "https://bugzilla.suse.com/1146368", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-15099", }, { cve: "CVE-2019-15290", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15290", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15290", url: "https://www.suse.com/security/cve/CVE-2019-15290", }, { category: "external", summary: "SUSE Bug 1146378 for CVE-2019-15290", url: "https://bugzilla.suse.com/1146378", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15290", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1146543 for CVE-2019-15290", url: "https://bugzilla.suse.com/1146543", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15290", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15290", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-15290", }, { cve: "CVE-2019-15504", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15504", }, ], notes: [ { category: "general", text: "drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15504", url: "https://www.suse.com/security/cve/CVE-2019-15504", }, { category: "external", summary: "SUSE Bug 1147116 for CVE-2019-15504", url: "https://bugzilla.suse.com/1147116", }, { category: "external", summary: "SUSE Bug 1185852 for CVE-2019-15504", url: "https://bugzilla.suse.com/1185852", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-15504", }, { cve: "CVE-2019-15902", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15902", }, ], notes: [ { category: "general", text: "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15902", url: "https://www.suse.com/security/cve/CVE-2019-15902", }, { category: "external", summary: "SUSE Bug 1149376 for CVE-2019-15902", url: "https://bugzilla.suse.com/1149376", }, { category: "external", summary: "SUSE Bug 1155131 for CVE-2019-15902", url: "https://bugzilla.suse.com/1155131", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-15902", }, { cve: "CVE-2019-16231", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16231", }, ], notes: [ { category: "general", text: "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16231", url: "https://www.suse.com/security/cve/CVE-2019-16231", }, { category: "external", summary: "SUSE Bug 1150466 for CVE-2019-16231", url: "https://bugzilla.suse.com/1150466", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-16231", }, { cve: "CVE-2019-16232", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16232", }, ], notes: [ { category: "general", text: "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16232", url: "https://www.suse.com/security/cve/CVE-2019-16232", }, { category: "external", summary: "SUSE Bug 1150465 for CVE-2019-16232", url: "https://bugzilla.suse.com/1150465", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-16232", }, { cve: "CVE-2019-16234", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16234", }, ], notes: [ { category: "general", text: "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16234", url: "https://www.suse.com/security/cve/CVE-2019-16234", }, { category: "external", summary: "SUSE Bug 1150452 for CVE-2019-16234", url: "https://bugzilla.suse.com/1150452", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-16234", }, { cve: "CVE-2019-17133", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-17133", }, ], notes: [ { category: "general", text: "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-17133", url: "https://www.suse.com/security/cve/CVE-2019-17133", }, { category: "external", summary: "SUSE Bug 1153158 for CVE-2019-17133", url: "https://bugzilla.suse.com/1153158", }, { category: "external", summary: "SUSE Bug 1153161 for CVE-2019-17133", url: "https://bugzilla.suse.com/1153161", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-17133", }, { cve: "CVE-2019-17666", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-17666", }, ], notes: [ { category: "general", text: "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-17666", url: "https://www.suse.com/security/cve/CVE-2019-17666", }, { category: "external", summary: "SUSE Bug 1154372 for CVE-2019-17666", url: "https://bugzilla.suse.com/1154372", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-17666", }, { cve: "CVE-2019-18808", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18808", }, ], notes: [ { category: "general", text: "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18808", url: "https://www.suse.com/security/cve/CVE-2019-18808", }, { category: "external", summary: "SUSE Bug 1156259 for CVE-2019-18808", url: "https://bugzilla.suse.com/1156259", }, { category: "external", summary: "SUSE Bug 1189884 for CVE-2019-18808", url: "https://bugzilla.suse.com/1189884", }, { category: "external", summary: "SUSE Bug 1190534 for CVE-2019-18808", url: "https://bugzilla.suse.com/1190534", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-18808", }, { cve: "CVE-2019-18812", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18812", }, ], notes: [ { category: "general", text: "A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18812", url: "https://www.suse.com/security/cve/CVE-2019-18812", }, { category: "external", summary: "SUSE Bug 1156277 for CVE-2019-18812", url: "https://bugzilla.suse.com/1156277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-18812", }, { cve: "CVE-2019-18813", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18813", }, ], notes: [ { category: "general", text: "A memory leak in the dwc3_pci_probe() function in drivers/usb/dwc3/dwc3-pci.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering platform_device_add_properties() failures, aka CID-9bbfceea12a8.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18813", url: "https://www.suse.com/security/cve/CVE-2019-18813", }, { category: "external", summary: "SUSE Bug 1156278 for CVE-2019-18813", url: "https://bugzilla.suse.com/1156278", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-18813", }, { cve: "CVE-2019-19252", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19252", }, ], notes: [ { category: "general", text: "vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19252", url: "https://www.suse.com/security/cve/CVE-2019-19252", }, { category: "external", summary: "SUSE Bug 1157813 for CVE-2019-19252", url: "https://bugzilla.suse.com/1157813", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-19252", }, { cve: "CVE-2019-19332", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19332", }, ], notes: [ { category: "general", text: "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel's KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could use this flaw to crash the system, resulting in a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19332", url: "https://www.suse.com/security/cve/CVE-2019-19332", }, { category: "external", summary: "SUSE Bug 1158827 for CVE-2019-19332", url: "https://bugzilla.suse.com/1158827", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-19332", }, { cve: "CVE-2019-19338", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19338", }, ], notes: [ { category: "general", text: "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19338", url: "https://www.suse.com/security/cve/CVE-2019-19338", }, { category: "external", summary: "SUSE Bug 1158954 for CVE-2019-19338", url: "https://bugzilla.suse.com/1158954", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-19338", }, { cve: "CVE-2019-3016", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3016", }, ], notes: [ { category: "general", text: "In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3016", url: "https://www.suse.com/security/cve/CVE-2019-3016", }, { category: "external", summary: "SUSE Bug 1159281 for CVE-2019-3016", url: "https://bugzilla.suse.com/1159281", }, { category: "external", summary: "SUSE Bug 1161154 for CVE-2019-3016", url: "https://bugzilla.suse.com/1161154", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-3016", }, { cve: "CVE-2019-3846", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3846", }, ], notes: [ { category: "general", text: "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3846", url: "https://www.suse.com/security/cve/CVE-2019-3846", }, { category: "external", summary: "SUSE Bug 1136424 for CVE-2019-3846", url: "https://bugzilla.suse.com/1136424", }, { category: "external", summary: "SUSE Bug 1136446 for CVE-2019-3846", url: "https://bugzilla.suse.com/1136446", }, { category: "external", summary: "SUSE Bug 1156330 for CVE-2019-3846", url: "https://bugzilla.suse.com/1156330", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-3846", }, { cve: "CVE-2019-3882", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3882", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3882", url: "https://www.suse.com/security/cve/CVE-2019-3882", }, { category: "external", summary: "SUSE Bug 1131416 for CVE-2019-3882", url: "https://bugzilla.suse.com/1131416", }, { category: "external", summary: "SUSE Bug 1131427 for CVE-2019-3882", url: "https://bugzilla.suse.com/1131427", }, { category: "external", summary: "SUSE Bug 1133319 for CVE-2019-3882", url: "https://bugzilla.suse.com/1133319", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-3882", }, { cve: "CVE-2019-3887", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3887", }, ], notes: [ { category: "general", text: "A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0's APIC register values via L2 guest, when 'virtualize x2APIC mode' is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3887", url: "https://www.suse.com/security/cve/CVE-2019-3887", }, { category: "external", summary: "SUSE Bug 1131800 for CVE-2019-3887", url: "https://bugzilla.suse.com/1131800", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-3887", }, { cve: "CVE-2019-6974", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-6974", }, ], notes: [ { category: "general", text: "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-6974", url: "https://www.suse.com/security/cve/CVE-2019-6974", }, { category: "external", summary: "SUSE Bug 1124728 for CVE-2019-6974", url: "https://bugzilla.suse.com/1124728", }, { category: "external", summary: "SUSE Bug 1124729 for CVE-2019-6974", url: "https://bugzilla.suse.com/1124729", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-6974", }, { cve: "CVE-2019-7221", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-7221", }, ], notes: [ { category: "general", text: "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-7221", url: "https://www.suse.com/security/cve/CVE-2019-7221", }, { category: "external", summary: "SUSE Bug 1124732 for CVE-2019-7221", url: "https://bugzilla.suse.com/1124732", }, { category: "external", summary: "SUSE Bug 1124734 for CVE-2019-7221", url: "https://bugzilla.suse.com/1124734", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-7221", }, { cve: "CVE-2019-7222", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-7222", }, ], notes: [ { category: "general", text: "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-7222", url: "https://www.suse.com/security/cve/CVE-2019-7222", }, { category: "external", summary: "SUSE Bug 1124735 for CVE-2019-7222", url: "https://bugzilla.suse.com/1124735", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.8, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-7222", }, { cve: "CVE-2019-8564", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-8564", }, ], notes: [ { category: "general", text: "A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-8564", url: "https://www.suse.com/security/cve/CVE-2019-8564", }, { category: "external", summary: "SUSE Bug 1132673 for CVE-2019-8564", url: "https://bugzilla.suse.com/1132673", }, { category: "external", summary: "SUSE Bug 1132828 for CVE-2019-8564", url: "https://bugzilla.suse.com/1132828", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-8564", }, { cve: "CVE-2019-8912", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-8912", }, ], notes: [ { category: "general", text: "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-8912", url: "https://www.suse.com/security/cve/CVE-2019-8912", }, { category: "external", summary: "SUSE Bug 1125907 for CVE-2019-8912", url: "https://bugzilla.suse.com/1125907", }, { category: "external", summary: "SUSE Bug 1126284 for CVE-2019-8912", url: "https://bugzilla.suse.com/1126284", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-8912", }, { cve: "CVE-2019-9500", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-9500", }, ], notes: [ { category: "general", text: "The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-9500", url: "https://www.suse.com/security/cve/CVE-2019-9500", }, { category: "external", summary: "SUSE Bug 1132681 for CVE-2019-9500", url: "https://bugzilla.suse.com/1132681", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-9500", }, { cve: "CVE-2020-10135", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-10135", }, ], notes: [ { category: "general", text: "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-10135", url: "https://www.suse.com/security/cve/CVE-2020-10135", }, { category: "external", summary: "SUSE Bug 1171988 for CVE-2020-10135", url: "https://bugzilla.suse.com/1171988", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-10135", }, { cve: "CVE-2020-10766", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-10766", }, ], notes: [ { category: "general", text: "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-10766", url: "https://www.suse.com/security/cve/CVE-2020-10766", }, { category: "external", summary: "SUSE Bug 1159281 for CVE-2020-10766", url: "https://bugzilla.suse.com/1159281", }, { category: "external", summary: "SUSE Bug 1172781 for CVE-2020-10766", url: "https://bugzilla.suse.com/1172781", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-10766", }, { cve: "CVE-2020-10767", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-10767", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-10767", url: "https://www.suse.com/security/cve/CVE-2020-10767", }, { category: "external", summary: "SUSE Bug 1159281 for CVE-2020-10767", url: "https://bugzilla.suse.com/1159281", }, { category: "external", summary: "SUSE Bug 1172782 for CVE-2020-10767", url: "https://bugzilla.suse.com/1172782", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-10767", }, { cve: "CVE-2020-10768", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-10768", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-10768", url: "https://www.suse.com/security/cve/CVE-2020-10768", }, { category: "external", summary: "SUSE Bug 1159281 for CVE-2020-10768", url: "https://bugzilla.suse.com/1159281", }, { category: "external", summary: "SUSE Bug 1172783 for CVE-2020-10768", url: "https://bugzilla.suse.com/1172783", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-10768", }, { cve: "CVE-2020-12351", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12351", }, ], notes: [ { category: "general", text: "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12351", url: "https://www.suse.com/security/cve/CVE-2020-12351", }, { category: "external", summary: "SUSE Bug 1177724 for CVE-2020-12351", url: "https://bugzilla.suse.com/1177724", }, { category: "external", summary: "SUSE Bug 1177729 for CVE-2020-12351", url: "https://bugzilla.suse.com/1177729", }, { category: "external", summary: "SUSE Bug 1178397 for CVE-2020-12351", url: "https://bugzilla.suse.com/1178397", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-12351", }, { cve: "CVE-2020-12352", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12352", }, ], notes: [ { category: "general", text: "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12352", url: "https://www.suse.com/security/cve/CVE-2020-12352", }, { category: "external", summary: "SUSE Bug 1177725 for CVE-2020-12352", url: "https://bugzilla.suse.com/1177725", }, { category: "external", summary: "SUSE Bug 1178398 for CVE-2020-12352", url: "https://bugzilla.suse.com/1178398", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-12352", }, { cve: "CVE-2020-14331", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14331", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14331", url: "https://www.suse.com/security/cve/CVE-2020-14331", }, { category: "external", summary: "SUSE Bug 1174205 for CVE-2020-14331", url: "https://bugzilla.suse.com/1174205", }, { category: "external", summary: "SUSE Bug 1174247 for CVE-2020-14331", url: "https://bugzilla.suse.com/1174247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14331", }, { cve: "CVE-2020-14386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14386", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14386", url: "https://www.suse.com/security/cve/CVE-2020-14386", }, { category: "external", summary: "SUSE Bug 1176069 for CVE-2020-14386", url: "https://bugzilla.suse.com/1176069", }, { category: "external", summary: "SUSE Bug 1176072 for CVE-2020-14386", url: "https://bugzilla.suse.com/1176072", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14386", }, { cve: "CVE-2020-24586", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-24586", }, ], notes: [ { category: "general", text: "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-24586", url: "https://www.suse.com/security/cve/CVE-2020-24586", }, { category: "external", summary: "SUSE Bug 1185859 for CVE-2020-24586", url: "https://bugzilla.suse.com/1185859", }, { category: "external", summary: "SUSE Bug 1192868 for CVE-2020-24586", url: "https://bugzilla.suse.com/1192868", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-24586", }, { cve: "CVE-2020-24587", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-24587", }, ], notes: [ { category: "general", text: "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-24587", url: "https://www.suse.com/security/cve/CVE-2020-24587", }, { category: "external", summary: "SUSE Bug 1185859 for CVE-2020-24587", url: "https://bugzilla.suse.com/1185859", }, { category: "external", summary: "SUSE Bug 1185862 for CVE-2020-24587", url: "https://bugzilla.suse.com/1185862", }, { category: "external", summary: "SUSE Bug 1192868 for CVE-2020-24587", url: "https://bugzilla.suse.com/1192868", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-24587", }, { cve: "CVE-2020-24588", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-24588", }, ], notes: [ { category: "general", text: "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-24588", url: "https://www.suse.com/security/cve/CVE-2020-24588", }, { category: "external", summary: "SUSE Bug 1185861 for CVE-2020-24588", url: "https://bugzilla.suse.com/1185861", }, { category: "external", summary: "SUSE Bug 1192868 for CVE-2020-24588", url: "https://bugzilla.suse.com/1192868", }, { category: "external", summary: "SUSE Bug 1199701 for CVE-2020-24588", url: "https://bugzilla.suse.com/1199701", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-24588", }, { cve: "CVE-2020-25639", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25639", }, ], notes: [ { category: "general", text: "A NULL pointer dereference flaw was found in the Linux kernel's GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25639", url: "https://www.suse.com/security/cve/CVE-2020-25639", }, { category: "external", summary: "SUSE Bug 1176846 for CVE-2020-25639", url: "https://bugzilla.suse.com/1176846", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-25639", }, { cve: "CVE-2020-25656", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25656", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25656", url: "https://www.suse.com/security/cve/CVE-2020-25656", }, { category: "external", summary: "SUSE Bug 1177766 for CVE-2020-25656", url: "https://bugzilla.suse.com/1177766", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-25656", }, { cve: "CVE-2020-25668", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25668", }, ], notes: [ { category: "general", text: "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25668", url: "https://www.suse.com/security/cve/CVE-2020-25668", }, { category: "external", summary: "SUSE Bug 1178123 for CVE-2020-25668", url: "https://bugzilla.suse.com/1178123", }, { category: "external", summary: "SUSE Bug 1178622 for CVE-2020-25668", url: "https://bugzilla.suse.com/1178622", }, { category: "external", summary: "SUSE Bug 1196914 for CVE-2020-25668", url: "https://bugzilla.suse.com/1196914", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-25668", }, { cve: "CVE-2020-26141", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-26141", }, ], notes: [ { category: "general", text: "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-26141", url: "https://www.suse.com/security/cve/CVE-2020-26141", }, { category: "external", summary: "SUSE Bug 1185987 for CVE-2020-26141", url: "https://bugzilla.suse.com/1185987", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-26141", }, { cve: "CVE-2020-2732", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2732", }, ], notes: [ { category: "general", text: "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2732", url: "https://www.suse.com/security/cve/CVE-2020-2732", }, { category: "external", summary: "SUSE Bug 1163971 for CVE-2020-2732", url: "https://bugzilla.suse.com/1163971", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2020-2732", }, { cve: "CVE-2020-29660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29660", }, ], notes: [ { category: "general", text: "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29660", url: "https://www.suse.com/security/cve/CVE-2020-29660", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-29660", }, { cve: "CVE-2020-29661", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29661", }, ], notes: [ { category: "general", text: "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29661", url: "https://www.suse.com/security/cve/CVE-2020-29661", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179877", }, { category: "external", summary: "SUSE Bug 1214268 for CVE-2020-29661", url: "https://bugzilla.suse.com/1214268", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2020-29661", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-29661", }, { cve: "CVE-2020-8648", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-8648", }, ], notes: [ { category: "general", text: "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-8648", url: "https://www.suse.com/security/cve/CVE-2020-8648", }, { category: "external", summary: "SUSE Bug 1162928 for CVE-2020-8648", url: "https://bugzilla.suse.com/1162928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-8648", }, { cve: "CVE-2020-8694", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-8694", }, ], notes: [ { category: "general", text: "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-8694", url: "https://www.suse.com/security/cve/CVE-2020-8694", }, { category: "external", summary: "SUSE Bug 1170415 for CVE-2020-8694", url: "https://bugzilla.suse.com/1170415", }, { category: "external", summary: "SUSE Bug 1170446 for CVE-2020-8694", url: "https://bugzilla.suse.com/1170446", }, { category: "external", summary: "SUSE Bug 1178591 for CVE-2020-8694", url: "https://bugzilla.suse.com/1178591", }, { category: "external", summary: "SUSE Bug 1178700 for CVE-2020-8694", url: "https://bugzilla.suse.com/1178700", }, { category: "external", summary: "SUSE Bug 1179661 for CVE-2020-8694", url: "https://bugzilla.suse.com/1179661", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-8694", }, { cve: "CVE-2021-23133", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-23133", }, ], notes: [ { category: "general", text: "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-23133", url: "https://www.suse.com/security/cve/CVE-2021-23133", }, { category: "external", summary: "SUSE Bug 1184675 for CVE-2021-23133", url: "https://bugzilla.suse.com/1184675", }, { category: "external", summary: "SUSE Bug 1185901 for CVE-2021-23133", url: "https://bugzilla.suse.com/1185901", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-23133", }, { cve: "CVE-2021-26708", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26708", }, ], notes: [ { category: "general", text: "A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26708", url: "https://www.suse.com/security/cve/CVE-2021-26708", }, { category: "external", summary: "SUSE Bug 1181806 for CVE-2021-26708", url: "https://bugzilla.suse.com/1181806", }, { category: "external", summary: "SUSE Bug 1183298 for CVE-2021-26708", url: "https://bugzilla.suse.com/1183298", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-26708", }, { cve: "CVE-2021-28971", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28971", }, ], notes: [ { category: "general", text: "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28971", url: "https://www.suse.com/security/cve/CVE-2021-28971", }, { category: "external", summary: "SUSE Bug 1184196 for CVE-2021-28971", url: "https://bugzilla.suse.com/1184196", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-28971", }, { cve: "CVE-2021-32606", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-32606", }, ], notes: [ { category: "general", text: "In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-32606", url: "https://www.suse.com/security/cve/CVE-2021-32606", }, { category: "external", summary: "SUSE Bug 1185953 for CVE-2021-32606", url: "https://bugzilla.suse.com/1185953", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-32606", }, { cve: "CVE-2021-33909", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-33909", }, ], notes: [ { category: "general", text: "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-33909", url: "https://www.suse.com/security/cve/CVE-2021-33909", }, { category: "external", summary: "SUSE Bug 1188062 for CVE-2021-33909", url: "https://bugzilla.suse.com/1188062", }, { category: "external", summary: "SUSE Bug 1188063 for CVE-2021-33909", url: "https://bugzilla.suse.com/1188063", }, { category: "external", summary: "SUSE Bug 1188257 for CVE-2021-33909", url: "https://bugzilla.suse.com/1188257", }, { category: "external", summary: "SUSE Bug 1189302 for CVE-2021-33909", url: "https://bugzilla.suse.com/1189302", }, { category: "external", summary: "SUSE Bug 1190859 for CVE-2021-33909", url: "https://bugzilla.suse.com/1190859", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-33909", }, { cve: "CVE-2021-3483", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3483", }, ], notes: [ { category: "general", text: "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3483", url: "https://www.suse.com/security/cve/CVE-2021-3483", }, { category: "external", summary: "SUSE Bug 1184393 for CVE-2021-3483", url: "https://bugzilla.suse.com/1184393", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-3483", }, { cve: "CVE-2021-3489", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3489", }, ], notes: [ { category: "general", text: "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3489", url: "https://www.suse.com/security/cve/CVE-2021-3489", }, { category: "external", summary: "SUSE Bug 1185640 for CVE-2021-3489", url: "https://bugzilla.suse.com/1185640", }, { category: "external", summary: "SUSE Bug 1185856 for CVE-2021-3489", url: "https://bugzilla.suse.com/1185856", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-3489", }, { cve: "CVE-2021-3490", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3490", }, ], notes: [ { category: "general", text: "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3490", url: "https://www.suse.com/security/cve/CVE-2021-3490", }, { category: "external", summary: "SUSE Bug 1185641 for CVE-2021-3490", url: "https://bugzilla.suse.com/1185641", }, { category: "external", summary: "SUSE Bug 1185796 for CVE-2021-3490", url: "https://bugzilla.suse.com/1185796", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-3490", }, { cve: "CVE-2021-3491", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3491", }, ], notes: [ { category: "general", text: "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/<PID>/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3491", url: "https://www.suse.com/security/cve/CVE-2021-3491", }, { category: "external", summary: "SUSE Bug 1185642 for CVE-2021-3491", url: "https://bugzilla.suse.com/1185642", }, { category: "external", summary: "SUSE Bug 1187090 for CVE-2021-3491", url: "https://bugzilla.suse.com/1187090", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-3491", }, { cve: "CVE-2021-3542", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3542", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-42739. Reason: This candidate is a reservation duplicate of CVE-2021-42739. Notes: All CVE users should reference CVE-2021-42739 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3542", url: "https://www.suse.com/security/cve/CVE-2021-3542", }, { category: "external", summary: "SUSE Bug 1184673 for CVE-2021-3542", url: "https://bugzilla.suse.com/1184673", }, { category: "external", summary: "SUSE Bug 1186063 for CVE-2021-3542", url: "https://bugzilla.suse.com/1186063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-3542", }, { cve: "CVE-2021-3640", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3640", }, ], notes: [ { category: "general", text: "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3640", url: "https://www.suse.com/security/cve/CVE-2021-3640", }, { category: "external", summary: "SUSE Bug 1188172 for CVE-2021-3640", url: "https://bugzilla.suse.com/1188172", }, { category: "external", summary: "SUSE Bug 1188613 for CVE-2021-3640", url: "https://bugzilla.suse.com/1188613", }, { category: "external", summary: "SUSE Bug 1191530 for CVE-2021-3640", url: "https://bugzilla.suse.com/1191530", }, { category: "external", summary: "SUSE Bug 1196810 for CVE-2021-3640", url: "https://bugzilla.suse.com/1196810", }, { category: "external", summary: "SUSE Bug 1196914 for CVE-2021-3640", url: "https://bugzilla.suse.com/1196914", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-3640", }, { cve: "CVE-2021-3653", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3653", }, ], notes: [ { category: "general", text: "A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3653", url: "https://www.suse.com/security/cve/CVE-2021-3653", }, { category: "external", summary: "SUSE Bug 1189399 for CVE-2021-3653", url: "https://bugzilla.suse.com/1189399", }, { category: "external", summary: "SUSE Bug 1189420 for CVE-2021-3653", url: "https://bugzilla.suse.com/1189420", }, { category: "external", summary: "SUSE Bug 1196914 for CVE-2021-3653", url: "https://bugzilla.suse.com/1196914", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-3653", }, { cve: "CVE-2021-3656", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3656", }, ], notes: [ { category: "general", text: "A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3656", url: "https://www.suse.com/security/cve/CVE-2021-3656", }, { category: "external", summary: "SUSE Bug 1189400 for CVE-2021-3656", url: "https://bugzilla.suse.com/1189400", }, { category: "external", summary: "SUSE Bug 1189418 for CVE-2021-3656", url: "https://bugzilla.suse.com/1189418", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-3656", }, { cve: "CVE-2021-3744", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3744", }, ], notes: [ { category: "general", text: "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3744", url: "https://www.suse.com/security/cve/CVE-2021-3744", }, { category: "external", summary: "SUSE Bug 1189884 for CVE-2021-3744", url: "https://bugzilla.suse.com/1189884", }, { category: "external", summary: "SUSE Bug 1190534 for CVE-2021-3744", url: "https://bugzilla.suse.com/1190534", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-3744", }, { cve: "CVE-2021-3753", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3753", }, ], notes: [ { category: "general", text: "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3753", url: "https://www.suse.com/security/cve/CVE-2021-3753", }, { category: "external", summary: "SUSE Bug 1190025 for CVE-2021-3753", url: "https://bugzilla.suse.com/1190025", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.9, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2021-3753", }, { cve: "CVE-2021-37576", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-37576", }, ], notes: [ { category: "general", text: "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-37576", url: "https://www.suse.com/security/cve/CVE-2021-37576", }, { category: "external", summary: "SUSE Bug 1188838 for CVE-2021-37576", url: "https://bugzilla.suse.com/1188838", }, { category: "external", summary: "SUSE Bug 1188842 for CVE-2021-37576", url: "https://bugzilla.suse.com/1188842", }, { category: "external", summary: "SUSE Bug 1190276 for CVE-2021-37576", url: "https://bugzilla.suse.com/1190276", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-37576", }, { cve: "CVE-2021-3759", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3759", }, ], notes: [ { category: "general", text: "A memory overflow vulnerability was found in the Linux kernel's ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3759", url: "https://www.suse.com/security/cve/CVE-2021-3759", }, { category: "external", summary: "SUSE Bug 1190115 for CVE-2021-3759", url: "https://bugzilla.suse.com/1190115", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-3759", }, { cve: "CVE-2021-38166", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-38166", }, ], notes: [ { category: "general", text: "In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-38166", url: "https://www.suse.com/security/cve/CVE-2021-38166", }, { category: "external", summary: "SUSE Bug 1189233 for CVE-2021-38166", url: "https://bugzilla.suse.com/1189233", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-38166", }, { cve: "CVE-2021-43976", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-43976", }, ], notes: [ { category: "general", text: "In the Linux kernel through 5.15.2, mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-43976", url: "https://www.suse.com/security/cve/CVE-2021-43976", }, { category: "external", summary: "SUSE Bug 1192847 for CVE-2021-43976", url: "https://bugzilla.suse.com/1192847", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-43976", }, { cve: "CVE-2022-0185", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0185", }, ], notes: [ { category: "general", text: "A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0185", url: "https://www.suse.com/security/cve/CVE-2022-0185", }, { category: "external", summary: "SUSE Bug 1194517 for CVE-2022-0185", url: "https://bugzilla.suse.com/1194517", }, { category: "external", summary: "SUSE Bug 1194737 for CVE-2022-0185", url: "https://bugzilla.suse.com/1194737", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-0185", }, { cve: "CVE-2022-0330", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0330", }, ], notes: [ { category: "general", text: "A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0330", url: "https://www.suse.com/security/cve/CVE-2022-0330", }, { category: "external", summary: "SUSE Bug 1194880 for CVE-2022-0330", url: "https://bugzilla.suse.com/1194880", }, { category: "external", summary: "SUSE Bug 1195950 for CVE-2022-0330", url: "https://bugzilla.suse.com/1195950", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0330", }, { cve: "CVE-2022-0847", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0847", }, ], notes: [ { category: "general", text: "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0847", url: "https://www.suse.com/security/cve/CVE-2022-0847", }, { category: "external", summary: "SUSE Bug 1196584 for CVE-2022-0847", url: "https://bugzilla.suse.com/1196584", }, { category: "external", summary: "SUSE Bug 1196601 for CVE-2022-0847", url: "https://bugzilla.suse.com/1196601", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-0847", }, { cve: "CVE-2022-0886", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0886", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-27666. Reason: This candidate is a reservation duplicate of CVE-2022-27666. Notes: All CVE users should reference CVE-2022-27666 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0886", url: "https://www.suse.com/security/cve/CVE-2022-0886", }, { category: "external", summary: "SUSE Bug 1197131 for CVE-2022-0886", url: "https://bugzilla.suse.com/1197131", }, { category: "external", summary: "SUSE Bug 1197133 for CVE-2022-0886", url: "https://bugzilla.suse.com/1197133", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-0886", }, { cve: "CVE-2022-1462", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1462", }, ], notes: [ { category: "general", text: "An out-of-bounds read flaw was found in the Linux kernel's TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1462", url: "https://www.suse.com/security/cve/CVE-2022-1462", }, { category: "external", summary: "SUSE Bug 1198829 for CVE-2022-1462", url: "https://bugzilla.suse.com/1198829", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1462", }, { cve: "CVE-2022-1516", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1516", }, ], notes: [ { category: "general", text: "A NULL pointer dereference flaw was found in the Linux kernel's X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1516", url: "https://www.suse.com/security/cve/CVE-2022-1516", }, { category: "external", summary: "SUSE Bug 1199012 for CVE-2022-1516", url: "https://bugzilla.suse.com/1199012", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1516", }, { cve: "CVE-2022-1679", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1679", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in the Linux kernel's Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1679", url: "https://www.suse.com/security/cve/CVE-2022-1679", }, { category: "external", summary: "SUSE Bug 1199487 for CVE-2022-1679", url: "https://bugzilla.suse.com/1199487", }, { category: "external", summary: "SUSE Bug 1201080 for CVE-2022-1679", url: "https://bugzilla.suse.com/1201080", }, { category: "external", summary: "SUSE Bug 1201832 for CVE-2022-1679", url: "https://bugzilla.suse.com/1201832", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-1679", url: "https://bugzilla.suse.com/1204132", }, { category: "external", summary: "SUSE Bug 1212316 for CVE-2022-1679", url: "https://bugzilla.suse.com/1212316", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1679", }, { cve: "CVE-2022-1729", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1729", }, ], notes: [ { category: "general", text: "A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1729", url: "https://www.suse.com/security/cve/CVE-2022-1729", }, { category: "external", summary: "SUSE Bug 1199507 for CVE-2022-1729", url: "https://bugzilla.suse.com/1199507", }, { category: "external", summary: "SUSE Bug 1199697 for CVE-2022-1729", url: "https://bugzilla.suse.com/1199697", }, { category: "external", summary: "SUSE Bug 1201832 for CVE-2022-1729", url: "https://bugzilla.suse.com/1201832", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.2, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-1729", }, { cve: "CVE-2022-1852", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1852", }, ], notes: [ { category: "general", text: "A NULL pointer dereference flaw was found in the Linux kernel's KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1852", url: "https://www.suse.com/security/cve/CVE-2022-1852", }, { category: "external", summary: "SUSE Bug 1199875 for CVE-2022-1852", url: "https://bugzilla.suse.com/1199875", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1852", }, { cve: "CVE-2022-1966", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1966", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1966", url: "https://www.suse.com/security/cve/CVE-2022-1966", }, { category: "external", summary: "SUSE Bug 1200015 for CVE-2022-1966", url: "https://bugzilla.suse.com/1200015", }, { category: "external", summary: "SUSE Bug 1200268 for CVE-2022-1966", url: "https://bugzilla.suse.com/1200268", }, { category: "external", summary: "SUSE Bug 1200494 for CVE-2022-1966", url: "https://bugzilla.suse.com/1200494", }, { category: "external", summary: "SUSE Bug 1200529 for CVE-2022-1966", url: "https://bugzilla.suse.com/1200529", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-1966", }, { cve: "CVE-2022-1972", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1972", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2078. Reason: This candidate is a reservation duplicate of CVE-2022-2078. Notes: All CVE users should reference CVE-2022-2078 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1972", url: "https://www.suse.com/security/cve/CVE-2022-1972", }, { category: "external", summary: "SUSE Bug 1200019 for CVE-2022-1972", url: "https://bugzilla.suse.com/1200019", }, { category: "external", summary: "SUSE Bug 1200266 for CVE-2022-1972", url: "https://bugzilla.suse.com/1200266", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1972", }, { cve: "CVE-2022-1973", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1973", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in the Linux kernel in log_replay in fs/ntfs3/fslog.c in the NTFS journal. This flaw allows a local attacker to crash the system and leads to a kernel information leak problem.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1973", url: "https://www.suse.com/security/cve/CVE-2022-1973", }, { category: "external", summary: "SUSE Bug 1200023 for CVE-2022-1973", url: "https://bugzilla.suse.com/1200023", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-1973", }, { cve: "CVE-2022-22942", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-22942", }, ], notes: [ { category: "general", text: "The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling 'file' pointer.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-22942", url: "https://www.suse.com/security/cve/CVE-2022-22942", }, { category: "external", summary: "SUSE Bug 1195065 for CVE-2022-22942", url: "https://bugzilla.suse.com/1195065", }, { category: "external", summary: "SUSE Bug 1195951 for CVE-2022-22942", url: "https://bugzilla.suse.com/1195951", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-22942", }, { cve: "CVE-2022-2308", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2308", }, ], notes: [ { category: "general", text: "A flaw was found in vDPA with VDUSE backend. There are currently no checks in VDUSE kernel driver to ensure the size of the device config space is in line with the features advertised by the VDUSE userspace application. In case of a mismatch, Virtio drivers config read helpers do not initialize the memory indirectly passed to vduse_vdpa_get_config() returning uninitialized memory from the stack. This could cause undefined behavior or data leaks in Virtio drivers.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2308", url: "https://www.suse.com/security/cve/CVE-2022-2308", }, { category: "external", summary: "SUSE Bug 1202573 for CVE-2022-2308", url: "https://bugzilla.suse.com/1202573", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2308", }, { cve: "CVE-2022-24958", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-24958", }, ], notes: [ { category: "general", text: "drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev->buf release.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-24958", url: "https://www.suse.com/security/cve/CVE-2022-24958", }, { category: "external", summary: "SUSE Bug 1195905 for CVE-2022-24958", url: "https://bugzilla.suse.com/1195905", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-24958", }, { cve: "CVE-2022-2588", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2588", }, ], notes: [ { category: "general", text: "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2588", url: "https://www.suse.com/security/cve/CVE-2022-2588", }, { category: "external", summary: "SUSE Bug 1202096 for CVE-2022-2588", url: "https://bugzilla.suse.com/1202096", }, { category: "external", summary: "SUSE Bug 1203613 for CVE-2022-2588", url: "https://bugzilla.suse.com/1203613", }, { category: "external", summary: "SUSE Bug 1204183 for CVE-2022-2588", url: "https://bugzilla.suse.com/1204183", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-2588", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-2588", }, { cve: "CVE-2022-2590", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2590", }, ], notes: [ { category: "general", text: "A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only shared memory mappings. This flaw allows an unprivileged, local user to gain write access to read-only memory mappings, increasing their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2590", url: "https://www.suse.com/security/cve/CVE-2022-2590", }, { category: "external", summary: "SUSE Bug 1202013 for CVE-2022-2590", url: "https://bugzilla.suse.com/1202013", }, { category: "external", summary: "SUSE Bug 1202089 for CVE-2022-2590", url: "https://bugzilla.suse.com/1202089", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-2590", }, { cve: "CVE-2022-26490", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-26490", }, ], notes: [ { category: "general", text: "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-26490", url: "https://www.suse.com/security/cve/CVE-2022-26490", }, { category: "external", summary: "SUSE Bug 1196830 for CVE-2022-26490", url: "https://bugzilla.suse.com/1196830", }, { category: "external", summary: "SUSE Bug 1201656 for CVE-2022-26490", url: "https://bugzilla.suse.com/1201656", }, { category: "external", summary: "SUSE Bug 1201969 for CVE-2022-26490", url: "https://bugzilla.suse.com/1201969", }, { category: "external", summary: "SUSE Bug 1211495 for CVE-2022-26490", url: "https://bugzilla.suse.com/1211495", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-26490", }, { cve: "CVE-2022-28388", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28388", }, ], notes: [ { category: "general", text: "usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28388", url: "https://www.suse.com/security/cve/CVE-2022-28388", }, { category: "external", summary: "SUSE Bug 1198032 for CVE-2022-28388", url: "https://bugzilla.suse.com/1198032", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-28388", }, { cve: "CVE-2022-28389", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28389", }, ], notes: [ { category: "general", text: "mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28389", url: "https://www.suse.com/security/cve/CVE-2022-28389", }, { category: "external", summary: "SUSE Bug 1198033 for CVE-2022-28389", url: "https://bugzilla.suse.com/1198033", }, { category: "external", summary: "SUSE Bug 1201657 for CVE-2022-28389", url: "https://bugzilla.suse.com/1201657", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-28389", }, { cve: "CVE-2022-28390", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28390", }, ], notes: [ { category: "general", text: "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28390", url: "https://www.suse.com/security/cve/CVE-2022-28390", }, { category: "external", summary: "SUSE Bug 1198031 for CVE-2022-28390", url: "https://bugzilla.suse.com/1198031", }, { category: "external", summary: "SUSE Bug 1201517 for CVE-2022-28390", url: "https://bugzilla.suse.com/1201517", }, { category: "external", summary: "SUSE Bug 1207969 for CVE-2022-28390", url: "https://bugzilla.suse.com/1207969", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-28390", }, { cve: "CVE-2022-28893", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28893", }, ], notes: [ { category: "general", text: "The SUNRPC subsystem in the Linux kernel through 5.17.2 can call xs_xprt_free before ensuring that sockets are in the intended state.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28893", url: "https://www.suse.com/security/cve/CVE-2022-28893", }, { category: "external", summary: "SUSE Bug 1198330 for CVE-2022-28893", url: "https://bugzilla.suse.com/1198330", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-28893", }, { cve: "CVE-2022-29900", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-29900", }, ], notes: [ { category: "general", text: "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-29900", url: "https://www.suse.com/security/cve/CVE-2022-29900", }, { category: "external", summary: "SUSE Bug 1199657 for CVE-2022-29900", url: "https://bugzilla.suse.com/1199657", }, { category: "external", summary: "SUSE Bug 1201469 for CVE-2022-29900", url: "https://bugzilla.suse.com/1201469", }, { category: "external", summary: "SUSE Bug 1207894 for CVE-2022-29900", url: "https://bugzilla.suse.com/1207894", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-29900", }, { cve: "CVE-2022-29901", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-29901", }, ], notes: [ { category: "general", text: "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-29901", url: "https://www.suse.com/security/cve/CVE-2022-29901", }, { category: "external", summary: "SUSE Bug 1201469 for CVE-2022-29901", url: "https://bugzilla.suse.com/1201469", }, { category: "external", summary: "SUSE Bug 1207894 for CVE-2022-29901", url: "https://bugzilla.suse.com/1207894", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-29901", }, { cve: "CVE-2022-29968", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-29968", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in fs/io_uring.c lacks initialization of kiocb->private.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-29968", url: "https://www.suse.com/security/cve/CVE-2022-29968", }, { category: "external", summary: "SUSE Bug 1199087 for CVE-2022-29968", url: "https://bugzilla.suse.com/1199087", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-29968", }, { cve: "CVE-2022-3424", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3424", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in the Linux kernel's SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3424", url: "https://www.suse.com/security/cve/CVE-2022-3424", }, { category: "external", summary: "SUSE Bug 1204166 for CVE-2022-3424", url: "https://bugzilla.suse.com/1204166", }, { category: "external", summary: "SUSE Bug 1204167 for CVE-2022-3424", url: "https://bugzilla.suse.com/1204167", }, { category: "external", summary: "SUSE Bug 1208044 for CVE-2022-3424", url: "https://bugzilla.suse.com/1208044", }, { category: "external", summary: "SUSE Bug 1212309 for CVE-2022-3424", url: "https://bugzilla.suse.com/1212309", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-3424", }, { cve: "CVE-2022-34918", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-34918", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-34918", url: "https://www.suse.com/security/cve/CVE-2022-34918", }, { category: "external", summary: "SUSE Bug 1201171 for CVE-2022-34918", url: "https://bugzilla.suse.com/1201171", }, { category: "external", summary: "SUSE Bug 1201177 for CVE-2022-34918", url: "https://bugzilla.suse.com/1201177", }, { category: "external", summary: "SUSE Bug 1201222 for CVE-2022-34918", url: "https://bugzilla.suse.com/1201222", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-34918", }, { cve: "CVE-2022-3628", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3628", }, ], notes: [ { category: "general", text: "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3628", url: "https://www.suse.com/security/cve/CVE-2022-3628", }, { category: "external", summary: "SUSE Bug 1204868 for CVE-2022-3628", url: "https://bugzilla.suse.com/1204868", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-3628", }, { cve: "CVE-2022-3640", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3640", }, ], notes: [ { category: "general", text: "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3640", url: "https://www.suse.com/security/cve/CVE-2022-3640", }, { category: "external", summary: "SUSE Bug 1204619 for CVE-2022-3640", url: "https://bugzilla.suse.com/1204619", }, { category: "external", summary: "SUSE Bug 1204624 for CVE-2022-3640", url: "https://bugzilla.suse.com/1204624", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-3640", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-3640", }, { cve: "CVE-2022-40982", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-40982", }, ], notes: [ { category: "general", text: "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-40982", url: "https://www.suse.com/security/cve/CVE-2022-40982", }, { category: "external", summary: "SUSE Bug 1206418 for CVE-2022-40982", url: "https://bugzilla.suse.com/1206418", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2022-40982", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-40982", }, { cve: "CVE-2022-41218", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-41218", }, ], notes: [ { category: "general", text: "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-41218", url: "https://www.suse.com/security/cve/CVE-2022-41218", }, { category: "external", summary: "SUSE Bug 1202960 for CVE-2022-41218", url: "https://bugzilla.suse.com/1202960", }, { category: "external", summary: "SUSE Bug 1203606 for CVE-2022-41218", url: "https://bugzilla.suse.com/1203606", }, { category: "external", summary: "SUSE Bug 1205313 for CVE-2022-41218", url: "https://bugzilla.suse.com/1205313", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-41218", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-41218", }, { cve: "CVE-2022-41674", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-41674", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-41674", url: "https://www.suse.com/security/cve/CVE-2022-41674", }, { category: "external", summary: "SUSE Bug 1203770 for CVE-2022-41674", url: "https://bugzilla.suse.com/1203770", }, { category: "external", summary: "SUSE Bug 1203994 for CVE-2022-41674", url: "https://bugzilla.suse.com/1203994", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-41674", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-41674", }, { cve: "CVE-2022-42719", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-42719", }, ], notes: [ { category: "general", text: "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-42719", url: "https://www.suse.com/security/cve/CVE-2022-42719", }, { category: "external", summary: "SUSE Bug 1204051 for CVE-2022-42719", url: "https://bugzilla.suse.com/1204051", }, { category: "external", summary: "SUSE Bug 1204292 for CVE-2022-42719", url: "https://bugzilla.suse.com/1204292", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-42719", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-42719", }, { cve: "CVE-2022-42720", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-42720", }, ], notes: [ { category: "general", text: "Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-42720", url: "https://www.suse.com/security/cve/CVE-2022-42720", }, { category: "external", summary: "SUSE Bug 1204059 for CVE-2022-42720", url: "https://bugzilla.suse.com/1204059", }, { category: "external", summary: "SUSE Bug 1204291 for CVE-2022-42720", url: "https://bugzilla.suse.com/1204291", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-42720", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-42720", }, { cve: "CVE-2022-42721", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-42721", }, ], notes: [ { category: "general", text: "A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-42721", url: "https://www.suse.com/security/cve/CVE-2022-42721", }, { category: "external", summary: "SUSE Bug 1204060 for CVE-2022-42721", url: "https://bugzilla.suse.com/1204060", }, { category: "external", summary: "SUSE Bug 1204290 for CVE-2022-42721", url: "https://bugzilla.suse.com/1204290", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-42721", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-42721", }, { cve: "CVE-2022-42722", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-42722", }, ], notes: [ { category: "general", text: "In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-42722", url: "https://www.suse.com/security/cve/CVE-2022-42722", }, { category: "external", summary: "SUSE Bug 1204125 for CVE-2022-42722", url: "https://bugzilla.suse.com/1204125", }, { category: "external", summary: "SUSE Bug 1204289 for CVE-2022-42722", url: "https://bugzilla.suse.com/1204289", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-42722", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-42722", }, { cve: "CVE-2022-4379", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-4379", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-4379", url: "https://www.suse.com/security/cve/CVE-2022-4379", }, { category: "external", summary: "SUSE Bug 1206209 for CVE-2022-4379", url: "https://bugzilla.suse.com/1206209", }, { category: "external", summary: "SUSE Bug 1206373 for CVE-2022-4379", url: "https://bugzilla.suse.com/1206373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-4379", }, { cve: "CVE-2022-44032", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-44032", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4000_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cmm_open() and cm4000_detach().", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-44032", url: "https://www.suse.com/security/cve/CVE-2022-44032", }, { category: "external", summary: "SUSE Bug 1204894 for CVE-2022-44032", url: "https://bugzilla.suse.com/1204894", }, { category: "external", summary: "SUSE Bug 1212290 for CVE-2022-44032", url: "https://bugzilla.suse.com/1212290", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-44032", }, { cve: "CVE-2022-44033", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-44033", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4040_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cm4040_open() and reader_detach().", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-44033", url: "https://www.suse.com/security/cve/CVE-2022-44033", }, { category: "external", summary: "SUSE Bug 1204922 for CVE-2022-44033", url: "https://bugzilla.suse.com/1204922", }, { category: "external", summary: "SUSE Bug 1212306 for CVE-2022-44033", url: "https://bugzilla.suse.com/1212306", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-44033", }, { cve: "CVE-2022-44034", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-44034", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/scr24x_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between scr24x_open() and scr24x_remove().", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-44034", url: "https://www.suse.com/security/cve/CVE-2022-44034", }, { category: "external", summary: "SUSE Bug 1204901 for CVE-2022-44034", url: "https://bugzilla.suse.com/1204901", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-44034", }, { cve: "CVE-2022-45884", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-45884", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvbdev.c has a use-after-free, related to dvb_register_device dynamically allocating fops.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-45884", url: "https://www.suse.com/security/cve/CVE-2022-45884", }, { category: "external", summary: "SUSE Bug 1205756 for CVE-2022-45884", url: "https://bugzilla.suse.com/1205756", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-45884", }, { cve: "CVE-2022-45885", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-45885", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_frontend.c has a race condition that can cause a use-after-free when a device is disconnected.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-45885", url: "https://www.suse.com/security/cve/CVE-2022-45885", }, { category: "external", summary: "SUSE Bug 1205758 for CVE-2022-45885", url: "https://bugzilla.suse.com/1205758", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-45885", }, { cve: "CVE-2022-45886", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-45886", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_net.c has a .disconnect versus dvb_device_open race condition that leads to a use-after-free.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-45886", url: "https://www.suse.com/security/cve/CVE-2022-45886", }, { category: "external", summary: "SUSE Bug 1205760 for CVE-2022-45886", url: "https://bugzilla.suse.com/1205760", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-45886", }, { cve: "CVE-2022-45887", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-45887", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/usb/ttusb-dec/ttusb_dec.c has a memory leak because of the lack of a dvb_frontend_detach call.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-45887", url: "https://www.suse.com/security/cve/CVE-2022-45887", }, { category: "external", summary: "SUSE Bug 1205762 for CVE-2022-45887", url: "https://bugzilla.suse.com/1205762", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2022-45887", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-45887", }, { cve: "CVE-2022-45888", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-45888", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-45888", url: "https://www.suse.com/security/cve/CVE-2022-45888", }, { category: "external", summary: "SUSE Bug 1205764 for CVE-2022-45888", url: "https://bugzilla.suse.com/1205764", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-45888", }, { cve: "CVE-2022-45919", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-45919", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-45919", url: "https://www.suse.com/security/cve/CVE-2022-45919", }, { category: "external", summary: "SUSE Bug 1205803 for CVE-2022-45919", url: "https://bugzilla.suse.com/1205803", }, { category: "external", summary: "SUSE Bug 1208912 for CVE-2022-45919", url: "https://bugzilla.suse.com/1208912", }, { category: "external", summary: "SUSE Bug 1214128 for CVE-2022-45919", url: "https://bugzilla.suse.com/1214128", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2022-45919", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-45919", }, { cve: "CVE-2022-45934", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-45934", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-45934", url: "https://www.suse.com/security/cve/CVE-2022-45934", }, { category: "external", summary: "SUSE Bug 1205796 for CVE-2022-45934", url: "https://bugzilla.suse.com/1205796", }, { category: "external", summary: "SUSE Bug 1212292 for CVE-2022-45934", url: "https://bugzilla.suse.com/1212292", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-45934", }, { cve: "CVE-2023-0045", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-0045", }, ], notes: [ { category: "general", text: "The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall. The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176.\n\nWe recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96\n\n", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-0045", url: "https://www.suse.com/security/cve/CVE-2023-0045", }, { category: "external", summary: "SUSE Bug 1207773 for CVE-2023-0045", url: "https://bugzilla.suse.com/1207773", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-0045", }, { cve: "CVE-2023-1076", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-1076", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-1076", url: "https://www.suse.com/security/cve/CVE-2023-1076", }, { category: "external", summary: "SUSE Bug 1208599 for CVE-2023-1076", url: "https://bugzilla.suse.com/1208599", }, { category: "external", summary: "SUSE Bug 1214019 for CVE-2023-1076", url: "https://bugzilla.suse.com/1214019", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-1076", }, { cve: "CVE-2023-1078", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-1078", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-1078", url: "https://www.suse.com/security/cve/CVE-2023-1078", }, { category: "external", summary: "SUSE Bug 1208601 for CVE-2023-1078", url: "https://bugzilla.suse.com/1208601", }, { category: "external", summary: "SUSE Bug 1208603 for CVE-2023-1078", url: "https://bugzilla.suse.com/1208603", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2023-1078", }, { cve: "CVE-2023-1192", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-1192", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access a free memory region, leading to a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-1192", url: "https://www.suse.com/security/cve/CVE-2023-1192", }, { category: "external", summary: "SUSE Bug 1208995 for CVE-2023-1192", url: "https://bugzilla.suse.com/1208995", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-1192", }, { cve: "CVE-2023-1380", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-1380", }, ], notes: [ { category: "general", text: "A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info->req_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-1380", url: "https://www.suse.com/security/cve/CVE-2023-1380", }, { category: "external", summary: "SUSE Bug 1209287 for CVE-2023-1380", url: "https://bugzilla.suse.com/1209287", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2023-1380", }, { cve: "CVE-2023-20569", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-20569", }, ], notes: [ { category: "general", text: "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-20569", url: "https://www.suse.com/security/cve/CVE-2023-20569", }, { category: "external", summary: "SUSE Bug 1213287 for CVE-2023-20569", url: "https://bugzilla.suse.com/1213287", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-20569", }, { cve: "CVE-2023-20593", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-20593", }, ], notes: [ { category: "general", text: "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-20593", url: "https://www.suse.com/security/cve/CVE-2023-20593", }, { category: "external", summary: "SUSE Bug 1213286 for CVE-2023-20593", url: "https://bugzilla.suse.com/1213286", }, { category: "external", summary: "SUSE Bug 1213616 for CVE-2023-20593", url: "https://bugzilla.suse.com/1213616", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-20593", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-20593", }, { cve: "CVE-2023-2124", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2124", }, ], notes: [ { category: "general", text: "An out-of-bounds memory access flaw was found in the Linux kernel's XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2124", url: "https://www.suse.com/security/cve/CVE-2023-2124", }, { category: "external", summary: "SUSE Bug 1210498 for CVE-2023-2124", url: "https://bugzilla.suse.com/1210498", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-2124", }, { cve: "CVE-2023-31084", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-31084", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel 6.2. There is a blocking operation when a task is in !TASK_RUNNING. In dvb_frontend_get_event, wait_event_interruptible is called; the condition is dvb_frontend_test_event(fepriv,events). In dvb_frontend_test_event, down(&fepriv->sem) is called. However, wait_event_interruptible would put the process to sleep, and down(&fepriv->sem) may block the process.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-31084", url: "https://www.suse.com/security/cve/CVE-2023-31084", }, { category: "external", summary: "SUSE Bug 1210783 for CVE-2023-31084", url: "https://bugzilla.suse.com/1210783", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-31084", }, { cve: "CVE-2023-3141", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3141", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3141", url: "https://www.suse.com/security/cve/CVE-2023-3141", }, { category: "external", summary: "SUSE Bug 1212129 for CVE-2023-3141", url: "https://bugzilla.suse.com/1212129", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-3141", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-3141", }, { cve: "CVE-2023-3269", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3269", }, ], notes: [ { category: "general", text: "A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3269", url: "https://www.suse.com/security/cve/CVE-2023-3269", }, { category: "external", summary: "SUSE Bug 1212395 for CVE-2023-3269", url: "https://bugzilla.suse.com/1212395", }, { category: "external", summary: "SUSE Bug 1213760 for CVE-2023-3269", url: "https://bugzilla.suse.com/1213760", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2023-3269", }, { cve: "CVE-2023-39192", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39192", }, ], notes: [ { category: "general", text: "A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39192", url: "https://www.suse.com/security/cve/CVE-2023-39192", }, { category: "external", summary: "SUSE Bug 1215858 for CVE-2023-39192", url: "https://bugzilla.suse.com/1215858", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-39192", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-39192", }, { cve: "CVE-2023-39193", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39193", }, ], notes: [ { category: "general", text: "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39193", url: "https://www.suse.com/security/cve/CVE-2023-39193", }, { category: "external", summary: "SUSE Bug 1215860 for CVE-2023-39193", url: "https://bugzilla.suse.com/1215860", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-39193", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-39193", }, { cve: "CVE-2023-4128", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4128", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Reason: This record is a duplicate of CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Notes: All CVE users should reference CVE-2023-4206, CVE-2023-4207, CVE-2023-4208 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4128", url: "https://www.suse.com/security/cve/CVE-2023-4128", }, { category: "external", summary: "SUSE Bug 1214149 for CVE-2023-4128", url: "https://bugzilla.suse.com/1214149", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-4128", }, { cve: "CVE-2023-4134", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4134", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4134", url: "https://www.suse.com/security/cve/CVE-2023-4134", }, { category: "external", summary: "SUSE Bug 1213971 for CVE-2023-4134", url: "https://bugzilla.suse.com/1213971", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-4134", }, { cve: "CVE-2023-4194", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4194", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 (\"tun: tun_chr_open(): correctly initialize socket uid\"), - 66b2c338adce (\"tap: tap_open(): correctly initialize socket uid\"), pass \"inode->i_uid\" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4194", url: "https://www.suse.com/security/cve/CVE-2023-4194", }, { category: "external", summary: "SUSE Bug 1214019 for CVE-2023-4194", url: "https://bugzilla.suse.com/1214019", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-4194", }, { cve: "CVE-2023-42753", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-42753", }, ], notes: [ { category: "general", text: "An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-42753", url: "https://www.suse.com/security/cve/CVE-2023-42753", }, { category: "external", summary: "SUSE Bug 1215150 for CVE-2023-42753", url: "https://bugzilla.suse.com/1215150", }, { category: "external", summary: "SUSE Bug 1218613 for CVE-2023-42753", url: "https://bugzilla.suse.com/1218613", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-42753", }, { cve: "CVE-2023-42754", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-42754", }, ], notes: [ { category: "general", text: "A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-42754", url: "https://www.suse.com/security/cve/CVE-2023-42754", }, { category: "external", summary: "SUSE Bug 1215467 for CVE-2023-42754", url: "https://bugzilla.suse.com/1215467", }, { category: "external", summary: "SUSE Bug 1222212 for CVE-2023-42754", url: "https://bugzilla.suse.com/1222212", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-42754", }, { cve: "CVE-2023-42756", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-42756", }, ], notes: [ { category: "general", text: "A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic due to the invocation of `__ip_set_put` on a wrong `set`. This issue may allow a local user to crash the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-42756", url: "https://www.suse.com/security/cve/CVE-2023-42756", }, { category: "external", summary: "SUSE Bug 1215767 for CVE-2023-42756", url: "https://bugzilla.suse.com/1215767", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-42756", }, { cve: "CVE-2023-4623", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4623", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4623", url: "https://www.suse.com/security/cve/CVE-2023-4623", }, { category: "external", summary: "SUSE Bug 1215115 for CVE-2023-4623", url: "https://bugzilla.suse.com/1215115", }, { category: "external", summary: "SUSE Bug 1215440 for CVE-2023-4623", url: "https://bugzilla.suse.com/1215440", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-4623", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-4623", url: "https://bugzilla.suse.com/1217531", }, { category: "external", summary: "SUSE Bug 1219698 for CVE-2023-4623", url: "https://bugzilla.suse.com/1219698", }, { category: "external", summary: "SUSE Bug 1221578 for CVE-2023-4623", url: "https://bugzilla.suse.com/1221578", }, { category: "external", summary: "SUSE Bug 1221598 for CVE-2023-4623", url: "https://bugzilla.suse.com/1221598", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2023-4623", }, { cve: "CVE-2023-46813", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-46813", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-46813", url: "https://www.suse.com/security/cve/CVE-2023-46813", }, { category: "external", summary: "SUSE Bug 1212649 for CVE-2023-46813", url: "https://bugzilla.suse.com/1212649", }, { category: "external", summary: "SUSE Bug 1216896 for CVE-2023-46813", url: "https://bugzilla.suse.com/1216896", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-46813", }, { cve: "CVE-2023-4881", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4881", }, ], notes: [ { category: "general", text: "** REJECT ** CVE-2023-4881 was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4881", url: "https://www.suse.com/security/cve/CVE-2023-4881", }, { category: "external", summary: "SUSE Bug 1215221 for CVE-2023-4881", url: "https://bugzilla.suse.com/1215221", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-4881", }, { cve: "CVE-2023-5345", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5345", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation.\n\nIn case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free.\n\nWe recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5345", url: "https://www.suse.com/security/cve/CVE-2023-5345", }, { category: "external", summary: "SUSE Bug 1215899 for CVE-2023-5345", url: "https://bugzilla.suse.com/1215899", }, { category: "external", summary: "SUSE Bug 1215971 for CVE-2023-5345", url: "https://bugzilla.suse.com/1215971", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-5345", }, { cve: "CVE-2023-6606", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6606", }, ], notes: [ { category: "general", text: "An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6606", url: "https://www.suse.com/security/cve/CVE-2023-6606", }, { category: "external", summary: "SUSE Bug 1217947 for CVE-2023-6606", url: "https://bugzilla.suse.com/1217947", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-6606", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-6606", }, { cve: "CVE-2023-6610", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6610", }, ], notes: [ { category: "general", text: "An out-of-bounds read vulnerability was found in smb2_dump_detail in fs/smb/client/smb2ops.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6610", url: "https://www.suse.com/security/cve/CVE-2023-6610", }, { category: "external", summary: "SUSE Bug 1217946 for CVE-2023-6610", url: "https://bugzilla.suse.com/1217946", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-6610", }, ], }
opensuse-su-2024:10728-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
kernel-devel-5.14.6-1.4 on GA media
Notes
Title of the patch
kernel-devel-5.14.6-1.4 on GA media
Description of the patch
These are all security issues fixed in the kernel-devel-5.14.6-1.4 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10728
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "kernel-devel-5.14.6-1.4 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the kernel-devel-5.14.6-1.4 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-10728", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10728-1.json", }, { category: "self", summary: "SUSE CVE CVE-2017-1000251 page", url: "https://www.suse.com/security/cve/CVE-2017-1000251/", }, { category: "self", summary: "SUSE CVE CVE-2017-12153 page", url: "https://www.suse.com/security/cve/CVE-2017-12153/", }, { category: "self", summary: "SUSE CVE CVE-2017-13080 page", url: "https://www.suse.com/security/cve/CVE-2017-13080/", }, { category: "self", summary: "SUSE CVE CVE-2017-14051 page", url: "https://www.suse.com/security/cve/CVE-2017-14051/", }, { category: "self", summary: "SUSE CVE CVE-2017-15129 page", url: "https://www.suse.com/security/cve/CVE-2017-15129/", }, { category: "self", summary: "SUSE CVE CVE-2017-15265 page", url: "https://www.suse.com/security/cve/CVE-2017-15265/", }, { category: "self", summary: "SUSE CVE CVE-2017-16536 page", url: "https://www.suse.com/security/cve/CVE-2017-16536/", }, { category: "self", summary: "SUSE CVE CVE-2017-16537 page", url: "https://www.suse.com/security/cve/CVE-2017-16537/", }, { category: "self", summary: "SUSE CVE CVE-2017-16645 page", url: "https://www.suse.com/security/cve/CVE-2017-16645/", }, { category: "self", summary: "SUSE CVE CVE-2017-16646 page", url: "https://www.suse.com/security/cve/CVE-2017-16646/", }, { category: "self", summary: "SUSE CVE CVE-2017-16647 page", url: "https://www.suse.com/security/cve/CVE-2017-16647/", }, { category: "self", summary: "SUSE CVE CVE-2017-16648 page", url: "https://www.suse.com/security/cve/CVE-2017-16648/", }, { category: "self", summary: "SUSE CVE CVE-2017-16995 page", url: "https://www.suse.com/security/cve/CVE-2017-16995/", }, { category: "self", summary: "SUSE CVE CVE-2017-16996 page", url: "https://www.suse.com/security/cve/CVE-2017-16996/", }, { category: "self", summary: "SUSE CVE CVE-2017-17448 page", url: "https://www.suse.com/security/cve/CVE-2017-17448/", }, { category: "self", summary: "SUSE CVE CVE-2017-17449 page", url: "https://www.suse.com/security/cve/CVE-2017-17449/", }, { category: "self", summary: "SUSE CVE CVE-2017-17450 page", url: "https://www.suse.com/security/cve/CVE-2017-17450/", }, { category: "self", summary: "SUSE CVE CVE-2017-17852 page", url: "https://www.suse.com/security/cve/CVE-2017-17852/", }, { category: "self", summary: "SUSE CVE CVE-2017-17853 page", url: "https://www.suse.com/security/cve/CVE-2017-17853/", }, { category: "self", summary: "SUSE CVE CVE-2017-17854 page", url: "https://www.suse.com/security/cve/CVE-2017-17854/", }, { category: "self", summary: "SUSE CVE CVE-2017-17855 page", url: "https://www.suse.com/security/cve/CVE-2017-17855/", }, { category: "self", summary: "SUSE CVE CVE-2017-17856 page", url: "https://www.suse.com/security/cve/CVE-2017-17856/", }, { category: "self", summary: "SUSE CVE CVE-2017-17857 page", url: "https://www.suse.com/security/cve/CVE-2017-17857/", }, { category: "self", summary: "SUSE CVE CVE-2017-17862 page", url: "https://www.suse.com/security/cve/CVE-2017-17862/", }, { category: "self", summary: "SUSE CVE CVE-2017-5123 page", url: "https://www.suse.com/security/cve/CVE-2017-5123/", }, { category: "self", summary: "SUSE CVE CVE-2017-5715 page", url: "https://www.suse.com/security/cve/CVE-2017-5715/", }, { category: "self", summary: "SUSE CVE CVE-2017-5753 page", url: "https://www.suse.com/security/cve/CVE-2017-5753/", }, { category: "self", summary: "SUSE CVE CVE-2017-5754 page", url: "https://www.suse.com/security/cve/CVE-2017-5754/", }, { category: "self", summary: "SUSE CVE CVE-2017-7541 page", url: "https://www.suse.com/security/cve/CVE-2017-7541/", }, { category: "self", summary: "SUSE CVE CVE-2017-7542 page", url: "https://www.suse.com/security/cve/CVE-2017-7542/", }, { category: "self", summary: "SUSE CVE CVE-2017-8824 page", url: "https://www.suse.com/security/cve/CVE-2017-8824/", }, { category: "self", summary: "SUSE CVE CVE-2017-8831 page", url: "https://www.suse.com/security/cve/CVE-2017-8831/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000004 page", url: "https://www.suse.com/security/cve/CVE-2018-1000004/", }, { category: "self", summary: "SUSE CVE CVE-2018-10322 page", url: "https://www.suse.com/security/cve/CVE-2018-10322/", }, { category: "self", summary: "SUSE CVE CVE-2018-10323 page", url: "https://www.suse.com/security/cve/CVE-2018-10323/", }, { category: "self", summary: "SUSE CVE CVE-2018-1068 page", url: "https://www.suse.com/security/cve/CVE-2018-1068/", }, { category: "self", summary: "SUSE CVE CVE-2018-1118 page", url: "https://www.suse.com/security/cve/CVE-2018-1118/", }, { category: "self", summary: "SUSE CVE CVE-2018-12232 page", url: "https://www.suse.com/security/cve/CVE-2018-12232/", }, { category: "self", summary: "SUSE CVE CVE-2018-12714 page", url: "https://www.suse.com/security/cve/CVE-2018-12714/", }, { category: "self", summary: "SUSE CVE CVE-2018-13053 page", url: "https://www.suse.com/security/cve/CVE-2018-13053/", }, { category: "self", summary: "SUSE CVE CVE-2018-18710 page", url: "https://www.suse.com/security/cve/CVE-2018-18710/", }, { category: "self", summary: "SUSE CVE CVE-2018-19824 page", url: "https://www.suse.com/security/cve/CVE-2018-19824/", }, { category: "self", summary: "SUSE CVE CVE-2018-5332 page", url: "https://www.suse.com/security/cve/CVE-2018-5332/", }, { category: "self", summary: "SUSE CVE CVE-2018-5333 page", url: "https://www.suse.com/security/cve/CVE-2018-5333/", }, { category: "self", summary: "SUSE CVE CVE-2018-8043 page", url: "https://www.suse.com/security/cve/CVE-2018-8043/", }, { category: "self", summary: "SUSE CVE CVE-2018-8087 page", url: "https://www.suse.com/security/cve/CVE-2018-8087/", }, { category: "self", summary: "SUSE CVE CVE-2018-8822 page", url: "https://www.suse.com/security/cve/CVE-2018-8822/", }, { category: "self", summary: "SUSE CVE CVE-2019-10207 page", url: "https://www.suse.com/security/cve/CVE-2019-10207/", }, { category: "self", summary: "SUSE CVE CVE-2019-11477 page", url: "https://www.suse.com/security/cve/CVE-2019-11477/", }, { category: "self", summary: "SUSE CVE CVE-2019-11478 page", url: "https://www.suse.com/security/cve/CVE-2019-11478/", }, { category: "self", summary: "SUSE CVE CVE-2019-11479 page", url: "https://www.suse.com/security/cve/CVE-2019-11479/", }, { category: "self", summary: "SUSE CVE CVE-2019-14615 page", url: "https://www.suse.com/security/cve/CVE-2019-14615/", }, { category: "self", summary: "SUSE CVE CVE-2019-14814 page", url: "https://www.suse.com/security/cve/CVE-2019-14814/", }, { category: "self", summary: "SUSE CVE CVE-2019-14896 page", url: "https://www.suse.com/security/cve/CVE-2019-14896/", }, { category: "self", summary: "SUSE CVE CVE-2019-15030 page", url: "https://www.suse.com/security/cve/CVE-2019-15030/", }, { category: "self", summary: "SUSE CVE CVE-2019-15031 page", url: "https://www.suse.com/security/cve/CVE-2019-15031/", }, { category: "self", summary: "SUSE CVE CVE-2019-15098 page", url: "https://www.suse.com/security/cve/CVE-2019-15098/", }, { category: "self", summary: "SUSE CVE CVE-2019-15099 page", url: "https://www.suse.com/security/cve/CVE-2019-15099/", }, { category: "self", summary: "SUSE CVE CVE-2019-15290 page", url: "https://www.suse.com/security/cve/CVE-2019-15290/", }, { category: "self", summary: "SUSE CVE CVE-2019-15504 page", url: "https://www.suse.com/security/cve/CVE-2019-15504/", }, { category: "self", summary: "SUSE CVE CVE-2019-15902 page", url: "https://www.suse.com/security/cve/CVE-2019-15902/", }, { category: "self", summary: "SUSE CVE CVE-2019-16231 page", url: "https://www.suse.com/security/cve/CVE-2019-16231/", }, { category: "self", summary: "SUSE CVE CVE-2019-16232 page", url: "https://www.suse.com/security/cve/CVE-2019-16232/", }, { category: "self", summary: "SUSE CVE CVE-2019-16234 page", url: "https://www.suse.com/security/cve/CVE-2019-16234/", }, { category: "self", summary: "SUSE CVE CVE-2019-17133 page", url: "https://www.suse.com/security/cve/CVE-2019-17133/", }, { category: "self", summary: "SUSE CVE CVE-2019-17666 page", url: "https://www.suse.com/security/cve/CVE-2019-17666/", }, { category: "self", summary: "SUSE CVE CVE-2019-18808 page", url: "https://www.suse.com/security/cve/CVE-2019-18808/", }, { category: "self", summary: "SUSE CVE CVE-2019-18812 page", url: "https://www.suse.com/security/cve/CVE-2019-18812/", }, { category: "self", summary: "SUSE CVE CVE-2019-18813 page", url: "https://www.suse.com/security/cve/CVE-2019-18813/", }, { category: "self", summary: "SUSE CVE CVE-2019-19252 page", url: "https://www.suse.com/security/cve/CVE-2019-19252/", }, { category: "self", summary: "SUSE CVE CVE-2019-19332 page", url: "https://www.suse.com/security/cve/CVE-2019-19332/", }, { category: "self", summary: "SUSE CVE CVE-2019-19338 page", url: "https://www.suse.com/security/cve/CVE-2019-19338/", }, { category: "self", summary: "SUSE CVE CVE-2019-3016 page", url: "https://www.suse.com/security/cve/CVE-2019-3016/", }, { category: "self", summary: "SUSE CVE CVE-2019-3846 page", url: "https://www.suse.com/security/cve/CVE-2019-3846/", }, { category: "self", summary: "SUSE CVE CVE-2019-3882 page", url: "https://www.suse.com/security/cve/CVE-2019-3882/", }, { category: "self", summary: "SUSE CVE CVE-2019-3887 page", url: "https://www.suse.com/security/cve/CVE-2019-3887/", }, { category: "self", summary: "SUSE CVE CVE-2019-6974 page", url: "https://www.suse.com/security/cve/CVE-2019-6974/", }, { category: "self", summary: "SUSE CVE CVE-2019-7221 page", url: "https://www.suse.com/security/cve/CVE-2019-7221/", }, { category: "self", summary: "SUSE CVE CVE-2019-7222 page", url: "https://www.suse.com/security/cve/CVE-2019-7222/", }, { category: "self", summary: "SUSE CVE CVE-2019-8564 page", url: "https://www.suse.com/security/cve/CVE-2019-8564/", }, { category: "self", summary: "SUSE CVE CVE-2019-8912 page", url: "https://www.suse.com/security/cve/CVE-2019-8912/", }, { category: "self", summary: "SUSE CVE CVE-2019-9500 page", url: "https://www.suse.com/security/cve/CVE-2019-9500/", }, { category: "self", summary: "SUSE CVE CVE-2020-10135 page", url: "https://www.suse.com/security/cve/CVE-2020-10135/", }, { category: "self", summary: "SUSE CVE CVE-2020-10766 page", url: "https://www.suse.com/security/cve/CVE-2020-10766/", }, { category: "self", summary: "SUSE CVE CVE-2020-10767 page", url: "https://www.suse.com/security/cve/CVE-2020-10767/", }, { category: "self", summary: "SUSE CVE CVE-2020-10768 page", url: "https://www.suse.com/security/cve/CVE-2020-10768/", }, { category: "self", summary: "SUSE CVE CVE-2020-12351 page", url: "https://www.suse.com/security/cve/CVE-2020-12351/", }, { category: "self", summary: "SUSE CVE CVE-2020-12352 page", url: "https://www.suse.com/security/cve/CVE-2020-12352/", }, { category: "self", summary: "SUSE CVE CVE-2020-14331 page", url: "https://www.suse.com/security/cve/CVE-2020-14331/", }, { category: "self", summary: "SUSE CVE CVE-2020-14386 page", url: "https://www.suse.com/security/cve/CVE-2020-14386/", }, { category: "self", summary: "SUSE CVE CVE-2020-24586 page", url: "https://www.suse.com/security/cve/CVE-2020-24586/", }, { category: "self", summary: "SUSE CVE CVE-2020-24587 page", url: "https://www.suse.com/security/cve/CVE-2020-24587/", }, { category: "self", summary: "SUSE CVE CVE-2020-24588 page", url: "https://www.suse.com/security/cve/CVE-2020-24588/", }, { category: "self", summary: "SUSE CVE CVE-2020-25639 page", url: "https://www.suse.com/security/cve/CVE-2020-25639/", }, { category: "self", summary: "SUSE CVE CVE-2020-25656 page", url: "https://www.suse.com/security/cve/CVE-2020-25656/", }, { category: "self", summary: "SUSE CVE CVE-2020-25668 page", url: "https://www.suse.com/security/cve/CVE-2020-25668/", }, { category: "self", summary: "SUSE CVE CVE-2020-26141 page", url: "https://www.suse.com/security/cve/CVE-2020-26141/", }, { category: "self", summary: "SUSE CVE CVE-2020-2732 page", url: "https://www.suse.com/security/cve/CVE-2020-2732/", }, { category: "self", summary: "SUSE CVE CVE-2020-29660 page", url: "https://www.suse.com/security/cve/CVE-2020-29660/", }, { category: "self", summary: "SUSE CVE CVE-2020-29661 page", url: "https://www.suse.com/security/cve/CVE-2020-29661/", }, { category: "self", summary: "SUSE CVE CVE-2020-8648 page", url: "https://www.suse.com/security/cve/CVE-2020-8648/", }, { category: "self", summary: "SUSE CVE CVE-2020-8694 page", url: "https://www.suse.com/security/cve/CVE-2020-8694/", }, { category: "self", summary: "SUSE CVE CVE-2021-23133 page", url: "https://www.suse.com/security/cve/CVE-2021-23133/", }, { category: "self", summary: "SUSE CVE CVE-2021-26708 page", url: "https://www.suse.com/security/cve/CVE-2021-26708/", }, { category: "self", summary: "SUSE CVE CVE-2021-28971 page", url: "https://www.suse.com/security/cve/CVE-2021-28971/", }, { category: "self", summary: "SUSE CVE CVE-2021-32606 page", url: "https://www.suse.com/security/cve/CVE-2021-32606/", }, { category: "self", summary: "SUSE CVE CVE-2021-33909 page", url: "https://www.suse.com/security/cve/CVE-2021-33909/", }, { category: "self", summary: "SUSE CVE CVE-2021-3483 page", url: "https://www.suse.com/security/cve/CVE-2021-3483/", }, { category: "self", summary: "SUSE CVE CVE-2021-3489 page", url: "https://www.suse.com/security/cve/CVE-2021-3489/", }, { category: "self", summary: "SUSE CVE CVE-2021-3490 page", url: "https://www.suse.com/security/cve/CVE-2021-3490/", }, { category: "self", summary: "SUSE CVE CVE-2021-3491 page", url: "https://www.suse.com/security/cve/CVE-2021-3491/", }, { category: "self", summary: "SUSE CVE CVE-2021-3640 page", url: "https://www.suse.com/security/cve/CVE-2021-3640/", }, { category: "self", summary: "SUSE CVE CVE-2021-3653 page", url: "https://www.suse.com/security/cve/CVE-2021-3653/", }, { category: "self", summary: "SUSE CVE CVE-2021-3656 page", url: "https://www.suse.com/security/cve/CVE-2021-3656/", }, { category: "self", summary: "SUSE CVE CVE-2021-3744 page", url: "https://www.suse.com/security/cve/CVE-2021-3744/", }, { category: "self", summary: "SUSE CVE CVE-2021-3753 page", url: "https://www.suse.com/security/cve/CVE-2021-3753/", }, { category: "self", summary: "SUSE CVE CVE-2021-37576 page", url: "https://www.suse.com/security/cve/CVE-2021-37576/", }, { category: "self", summary: "SUSE CVE CVE-2021-3759 page", url: "https://www.suse.com/security/cve/CVE-2021-3759/", }, { category: "self", summary: "SUSE CVE CVE-2021-38166 page", url: "https://www.suse.com/security/cve/CVE-2021-38166/", }, ], title: "kernel-devel-5.14.6-1.4 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:10728-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-5.14.6-1.4.aarch64", product: { name: "kernel-devel-5.14.6-1.4.aarch64", product_id: "kernel-devel-5.14.6-1.4.aarch64", }, }, { category: "product_version", name: "kernel-macros-5.14.6-1.4.aarch64", product: { name: "kernel-macros-5.14.6-1.4.aarch64", product_id: "kernel-macros-5.14.6-1.4.aarch64", }, }, { category: "product_version", name: "kernel-source-5.14.6-1.4.aarch64", product: { name: "kernel-source-5.14.6-1.4.aarch64", product_id: "kernel-source-5.14.6-1.4.aarch64", }, }, { category: "product_version", name: "kernel-source-vanilla-5.14.6-1.4.aarch64", product: { name: "kernel-source-vanilla-5.14.6-1.4.aarch64", product_id: "kernel-source-vanilla-5.14.6-1.4.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-5.14.6-1.4.ppc64le", product: { name: "kernel-devel-5.14.6-1.4.ppc64le", product_id: "kernel-devel-5.14.6-1.4.ppc64le", }, }, { category: "product_version", name: "kernel-macros-5.14.6-1.4.ppc64le", product: { name: "kernel-macros-5.14.6-1.4.ppc64le", product_id: "kernel-macros-5.14.6-1.4.ppc64le", }, }, { category: "product_version", name: "kernel-source-5.14.6-1.4.ppc64le", product: { name: "kernel-source-5.14.6-1.4.ppc64le", product_id: "kernel-source-5.14.6-1.4.ppc64le", }, }, { category: "product_version", name: "kernel-source-vanilla-5.14.6-1.4.ppc64le", product: { name: "kernel-source-vanilla-5.14.6-1.4.ppc64le", product_id: "kernel-source-vanilla-5.14.6-1.4.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kernel-devel-5.14.6-1.4.s390x", product: { name: "kernel-devel-5.14.6-1.4.s390x", product_id: "kernel-devel-5.14.6-1.4.s390x", }, }, { category: "product_version", name: "kernel-macros-5.14.6-1.4.s390x", product: { name: "kernel-macros-5.14.6-1.4.s390x", product_id: "kernel-macros-5.14.6-1.4.s390x", }, }, { category: "product_version", name: "kernel-source-5.14.6-1.4.s390x", product: { name: "kernel-source-5.14.6-1.4.s390x", product_id: "kernel-source-5.14.6-1.4.s390x", }, }, { category: "product_version", name: "kernel-source-vanilla-5.14.6-1.4.s390x", product: { name: "kernel-source-vanilla-5.14.6-1.4.s390x", product_id: "kernel-source-vanilla-5.14.6-1.4.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "kernel-devel-5.14.6-1.4.x86_64", product: { name: "kernel-devel-5.14.6-1.4.x86_64", product_id: "kernel-devel-5.14.6-1.4.x86_64", }, }, { category: "product_version", name: "kernel-macros-5.14.6-1.4.x86_64", product: { name: "kernel-macros-5.14.6-1.4.x86_64", product_id: "kernel-macros-5.14.6-1.4.x86_64", }, }, { category: "product_version", name: "kernel-source-5.14.6-1.4.x86_64", product: { name: "kernel-source-5.14.6-1.4.x86_64", product_id: "kernel-source-5.14.6-1.4.x86_64", }, }, { category: "product_version", name: "kernel-source-vanilla-5.14.6-1.4.x86_64", product: { name: "kernel-source-vanilla-5.14.6-1.4.x86_64", product_id: "kernel-source-vanilla-5.14.6-1.4.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-devel-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", }, product_reference: "kernel-devel-5.14.6-1.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", }, product_reference: "kernel-devel-5.14.6-1.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.14.6-1.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", }, product_reference: "kernel-devel-5.14.6-1.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", }, product_reference: "kernel-devel-5.14.6-1.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", }, product_reference: "kernel-macros-5.14.6-1.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", }, product_reference: "kernel-macros-5.14.6-1.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.14.6-1.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", }, product_reference: "kernel-macros-5.14.6-1.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", }, product_reference: "kernel-macros-5.14.6-1.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", }, product_reference: "kernel-source-5.14.6-1.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", }, product_reference: "kernel-source-5.14.6-1.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.14.6-1.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", }, product_reference: "kernel-source-5.14.6-1.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", }, product_reference: "kernel-source-5.14.6-1.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-source-vanilla-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", }, product_reference: "kernel-source-vanilla-5.14.6-1.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-source-vanilla-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", }, product_reference: "kernel-source-vanilla-5.14.6-1.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-source-vanilla-5.14.6-1.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", }, product_reference: "kernel-source-vanilla-5.14.6-1.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-source-vanilla-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", }, product_reference: "kernel-source-vanilla-5.14.6-1.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2017-1000251", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000251", }, ], notes: [ { category: "general", text: "The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000251", url: "https://www.suse.com/security/cve/CVE-2017-1000251", }, { category: "external", summary: "SUSE Bug 1057389 for CVE-2017-1000251", url: "https://bugzilla.suse.com/1057389", }, { category: "external", summary: "SUSE Bug 1057950 for CVE-2017-1000251", url: "https://bugzilla.suse.com/1057950", }, { category: "external", summary: "SUSE Bug 1070535 for CVE-2017-1000251", url: "https://bugzilla.suse.com/1070535", }, { category: "external", summary: "SUSE Bug 1072117 for CVE-2017-1000251", url: "https://bugzilla.suse.com/1072117", }, { category: "external", summary: "SUSE Bug 1072162 for CVE-2017-1000251", url: "https://bugzilla.suse.com/1072162", }, { category: "external", summary: "SUSE Bug 1120758 for CVE-2017-1000251", url: "https://bugzilla.suse.com/1120758", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-1000251", }, { cve: "CVE-2017-12153", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12153", }, ], notes: [ { category: "general", text: "A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12153", url: "https://www.suse.com/security/cve/CVE-2017-12153", }, { category: "external", summary: "SUSE Bug 1058410 for CVE-2017-12153", url: "https://bugzilla.suse.com/1058410", }, { category: "external", summary: "SUSE Bug 1058624 for CVE-2017-12153", url: "https://bugzilla.suse.com/1058624", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-12153", }, { cve: "CVE-2017-13080", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-13080", }, ], notes: [ { category: "general", text: "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-13080", url: "https://www.suse.com/security/cve/CVE-2017-13080", }, { category: "external", summary: "SUSE Bug 1056061 for CVE-2017-13080", url: "https://bugzilla.suse.com/1056061", }, { category: "external", summary: "SUSE Bug 1063479 for CVE-2017-13080", url: "https://bugzilla.suse.com/1063479", }, { category: "external", summary: "SUSE Bug 1063667 for CVE-2017-13080", url: "https://bugzilla.suse.com/1063667", }, { category: "external", summary: "SUSE Bug 1063671 for CVE-2017-13080", url: "https://bugzilla.suse.com/1063671", }, { category: "external", summary: "SUSE Bug 1066295 for CVE-2017-13080", url: "https://bugzilla.suse.com/1066295", }, { category: "external", summary: "SUSE Bug 1105108 for CVE-2017-13080", url: "https://bugzilla.suse.com/1105108", }, { category: "external", summary: "SUSE Bug 1178872 for CVE-2017-13080", url: "https://bugzilla.suse.com/1178872", }, { category: "external", summary: "SUSE Bug 1179588 for CVE-2017-13080", url: "https://bugzilla.suse.com/1179588", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-13080", }, { cve: "CVE-2017-14051", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14051", }, ], notes: [ { category: "general", text: "An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14051", url: "https://www.suse.com/security/cve/CVE-2017-14051", }, { category: "external", summary: "SUSE Bug 1056588 for CVE-2017-14051", url: "https://bugzilla.suse.com/1056588", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-14051", }, { cve: "CVE-2017-15129", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15129", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15129", url: "https://www.suse.com/security/cve/CVE-2017-15129", }, { category: "external", summary: "SUSE Bug 1074839 for CVE-2017-15129", url: "https://bugzilla.suse.com/1074839", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-15129", }, { cve: "CVE-2017-15265", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15265", }, ], notes: [ { category: "general", text: "Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15265", url: "https://www.suse.com/security/cve/CVE-2017-15265", }, { category: "external", summary: "SUSE Bug 1062520 for CVE-2017-15265", url: "https://bugzilla.suse.com/1062520", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2017-15265", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-15265", }, { cve: "CVE-2017-16536", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16536", }, ], notes: [ { category: "general", text: "The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16536", url: "https://www.suse.com/security/cve/CVE-2017-16536", }, { category: "external", summary: "SUSE Bug 1066606 for CVE-2017-16536", url: "https://bugzilla.suse.com/1066606", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2017-16536", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2017-16536", url: "https://bugzilla.suse.com/1146519", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-16536", }, { cve: "CVE-2017-16537", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16537", }, ], notes: [ { category: "general", text: "The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16537", url: "https://www.suse.com/security/cve/CVE-2017-16537", }, { category: "external", summary: "SUSE Bug 1066573 for CVE-2017-16537", url: "https://bugzilla.suse.com/1066573", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2017-16537", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2017-16537", url: "https://bugzilla.suse.com/1146519", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-16537", }, { cve: "CVE-2017-16645", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16645", }, ], notes: [ { category: "general", text: "The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16645", url: "https://www.suse.com/security/cve/CVE-2017-16645", }, { category: "external", summary: "SUSE Bug 1067132 for CVE-2017-16645", url: "https://bugzilla.suse.com/1067132", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2017-16645", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2017-16645", url: "https://bugzilla.suse.com/1146519", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-16645", }, { cve: "CVE-2017-16646", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16646", }, ], notes: [ { category: "general", text: "drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16646", url: "https://www.suse.com/security/cve/CVE-2017-16646", }, { category: "external", summary: "SUSE Bug 1067105 for CVE-2017-16646", url: "https://bugzilla.suse.com/1067105", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2017-16646", url: "https://bugzilla.suse.com/1146519", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-16646", }, { cve: "CVE-2017-16647", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16647", }, ], notes: [ { category: "general", text: "drivers/net/usb/asix_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16647", url: "https://www.suse.com/security/cve/CVE-2017-16647", }, { category: "external", summary: "SUSE Bug 1067102 for CVE-2017-16647", url: "https://bugzilla.suse.com/1067102", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2017-16647", url: "https://bugzilla.suse.com/1146519", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-16647", }, { cve: "CVE-2017-16648", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16648", }, ], notes: [ { category: "general", text: "The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16648", url: "https://www.suse.com/security/cve/CVE-2017-16648", }, { category: "external", summary: "SUSE Bug 1067087 for CVE-2017-16648", url: "https://bugzilla.suse.com/1067087", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2017-16648", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2017-16648", url: "https://bugzilla.suse.com/1146519", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-16648", }, { cve: "CVE-2017-16995", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16995", }, ], notes: [ { category: "general", text: "The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16995", url: "https://www.suse.com/security/cve/CVE-2017-16995", }, { category: "external", summary: "SUSE Bug 1073928 for CVE-2017-16995", url: "https://bugzilla.suse.com/1073928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-16995", }, { cve: "CVE-2017-16996", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16996", }, ], notes: [ { category: "general", text: "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16996", url: "https://www.suse.com/security/cve/CVE-2017-16996", }, { category: "external", summary: "SUSE Bug 1073928 for CVE-2017-16996", url: "https://bugzilla.suse.com/1073928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-16996", }, { cve: "CVE-2017-17448", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17448", }, ], notes: [ { category: "general", text: "net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17448", url: "https://www.suse.com/security/cve/CVE-2017-17448", }, { category: "external", summary: "SUSE Bug 1071693 for CVE-2017-17448", url: "https://bugzilla.suse.com/1071693", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-17448", }, { cve: "CVE-2017-17449", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17449", }, ], notes: [ { category: "general", text: "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17449", url: "https://www.suse.com/security/cve/CVE-2017-17449", }, { category: "external", summary: "SUSE Bug 1071694 for CVE-2017-17449", url: "https://bugzilla.suse.com/1071694", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-17449", }, { cve: "CVE-2017-17450", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17450", }, ], notes: [ { category: "general", text: "net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17450", url: "https://www.suse.com/security/cve/CVE-2017-17450", }, { category: "external", summary: "SUSE Bug 1071695 for CVE-2017-17450", url: "https://bugzilla.suse.com/1071695", }, { category: "external", summary: "SUSE Bug 1074033 for CVE-2017-17450", url: "https://bugzilla.suse.com/1074033", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2017-17450", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-17450", }, { cve: "CVE-2017-17852", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17852", }, ], notes: [ { category: "general", text: "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of 32-bit ALU ops.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17852", url: "https://www.suse.com/security/cve/CVE-2017-17852", }, { category: "external", summary: "SUSE Bug 1073928 for CVE-2017-17852", url: "https://bugzilla.suse.com/1073928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-17852", }, { cve: "CVE-2017-17853", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17853", }, ], notes: [ { category: "general", text: "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17853", url: "https://www.suse.com/security/cve/CVE-2017-17853", }, { category: "external", summary: "SUSE Bug 1073928 for CVE-2017-17853", url: "https://bugzilla.suse.com/1073928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-17853", }, { cve: "CVE-2017-17854", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17854", }, ], notes: [ { category: "general", text: "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmetic.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17854", url: "https://www.suse.com/security/cve/CVE-2017-17854", }, { category: "external", summary: "SUSE Bug 1073928 for CVE-2017-17854", url: "https://bugzilla.suse.com/1073928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-17854", }, { cve: "CVE-2017-17855", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17855", }, ], notes: [ { category: "general", text: "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging improper use of pointers in place of scalars.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17855", url: "https://www.suse.com/security/cve/CVE-2017-17855", }, { category: "external", summary: "SUSE Bug 1073928 for CVE-2017-17855", url: "https://bugzilla.suse.com/1073928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-17855", }, { cve: "CVE-2017-17856", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17856", }, ], notes: [ { category: "general", text: "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the lack of stack-pointer alignment enforcement.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17856", url: "https://www.suse.com/security/cve/CVE-2017-17856", }, { category: "external", summary: "SUSE Bug 1073928 for CVE-2017-17856", url: "https://bugzilla.suse.com/1073928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-17856", }, { cve: "CVE-2017-17857", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17857", }, ], notes: [ { category: "general", text: "The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17857", url: "https://www.suse.com/security/cve/CVE-2017-17857", }, { category: "external", summary: "SUSE Bug 1073928 for CVE-2017-17857", url: "https://bugzilla.suse.com/1073928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-17857", }, { cve: "CVE-2017-17862", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17862", }, ], notes: [ { category: "general", text: "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17862", url: "https://www.suse.com/security/cve/CVE-2017-17862", }, { category: "external", summary: "SUSE Bug 1073928 for CVE-2017-17862", url: "https://bugzilla.suse.com/1073928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-17862", }, { cve: "CVE-2017-5123", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-5123", }, ], notes: [ { category: "general", text: "Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-5123", url: "https://www.suse.com/security/cve/CVE-2017-5123", }, { category: "external", summary: "SUSE Bug 1062473 for CVE-2017-5123", url: "https://bugzilla.suse.com/1062473", }, { category: "external", summary: "SUSE Bug 1122971 for CVE-2017-5123", url: "https://bugzilla.suse.com/1122971", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-5123", }, { cve: "CVE-2017-5715", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-5715", }, ], notes: [ { category: "general", text: "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-5715", url: "https://www.suse.com/security/cve/CVE-2017-5715", }, { category: "external", summary: "SUSE Bug 1068032 for CVE-2017-5715", url: "https://bugzilla.suse.com/1068032", }, { category: "external", summary: "SUSE Bug 1074562 for CVE-2017-5715", url: "https://bugzilla.suse.com/1074562", }, { category: "external", summary: "SUSE Bug 1074578 for CVE-2017-5715", url: "https://bugzilla.suse.com/1074578", }, { category: "external", summary: "SUSE Bug 1074701 for CVE-2017-5715", url: "https://bugzilla.suse.com/1074701", }, { category: "external", summary: "SUSE Bug 1074741 for CVE-2017-5715", url: "https://bugzilla.suse.com/1074741", }, { category: "external", summary: "SUSE Bug 1074919 for CVE-2017-5715", url: "https://bugzilla.suse.com/1074919", }, { category: "external", summary: "SUSE Bug 1075006 for CVE-2017-5715", url: "https://bugzilla.suse.com/1075006", }, { category: "external", summary: "SUSE Bug 1075007 for CVE-2017-5715", url: "https://bugzilla.suse.com/1075007", }, { category: "external", summary: "SUSE Bug 1075262 for CVE-2017-5715", url: "https://bugzilla.suse.com/1075262", }, { category: "external", summary: "SUSE Bug 1075419 for CVE-2017-5715", url: "https://bugzilla.suse.com/1075419", }, { category: "external", summary: "SUSE Bug 1076115 for CVE-2017-5715", url: "https://bugzilla.suse.com/1076115", }, { category: "external", summary: "SUSE Bug 1076372 for CVE-2017-5715", url: "https://bugzilla.suse.com/1076372", }, { category: "external", summary: "SUSE Bug 1076606 for CVE-2017-5715", url: "https://bugzilla.suse.com/1076606", }, { category: "external", summary: "SUSE Bug 1078353 for CVE-2017-5715", url: "https://bugzilla.suse.com/1078353", }, { category: "external", summary: "SUSE Bug 1080039 for CVE-2017-5715", url: "https://bugzilla.suse.com/1080039", }, { category: "external", summary: "SUSE Bug 1087887 for CVE-2017-5715", url: "https://bugzilla.suse.com/1087887", }, { category: "external", summary: "SUSE Bug 1087939 for CVE-2017-5715", url: "https://bugzilla.suse.com/1087939", }, { category: "external", summary: "SUSE Bug 1088147 for CVE-2017-5715", url: "https://bugzilla.suse.com/1088147", }, { category: "external", summary: "SUSE Bug 1089055 for CVE-2017-5715", url: "https://bugzilla.suse.com/1089055", }, { category: "external", summary: "SUSE Bug 1091815 for CVE-2017-5715", url: "https://bugzilla.suse.com/1091815", }, { category: "external", summary: "SUSE Bug 1095735 for CVE-2017-5715", url: "https://bugzilla.suse.com/1095735", }, { category: "external", summary: "SUSE Bug 1102517 for CVE-2017-5715", url: "https://bugzilla.suse.com/1102517", }, { category: "external", summary: "SUSE Bug 1105108 for CVE-2017-5715", url: "https://bugzilla.suse.com/1105108", }, { category: "external", summary: "SUSE Bug 1126516 for CVE-2017-5715", url: "https://bugzilla.suse.com/1126516", }, { category: "external", summary: "SUSE Bug 1173489 for CVE-2017-5715", url: "https://bugzilla.suse.com/1173489", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2017-5715", url: "https://bugzilla.suse.com/1178658", }, { category: "external", summary: "SUSE Bug 1201457 for CVE-2017-5715", url: "https://bugzilla.suse.com/1201457", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2017-5715", url: "https://bugzilla.suse.com/1201877", }, { category: "external", summary: "SUSE Bug 1203236 for CVE-2017-5715", url: "https://bugzilla.suse.com/1203236", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-5715", }, { cve: "CVE-2017-5753", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-5753", }, ], notes: [ { category: "general", text: "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-5753", url: "https://www.suse.com/security/cve/CVE-2017-5753", }, { category: "external", summary: "SUSE Bug 1068032 for CVE-2017-5753", url: "https://bugzilla.suse.com/1068032", }, { category: "external", summary: "SUSE Bug 1074562 for CVE-2017-5753", url: "https://bugzilla.suse.com/1074562", }, { category: "external", summary: "SUSE Bug 1074578 for CVE-2017-5753", url: "https://bugzilla.suse.com/1074578", }, { category: "external", summary: "SUSE Bug 1074701 for CVE-2017-5753", url: "https://bugzilla.suse.com/1074701", }, { category: "external", summary: "SUSE Bug 1075006 for CVE-2017-5753", url: "https://bugzilla.suse.com/1075006", }, { category: "external", summary: "SUSE Bug 1075419 for CVE-2017-5753", url: "https://bugzilla.suse.com/1075419", }, { category: "external", summary: "SUSE Bug 1075748 for CVE-2017-5753", url: "https://bugzilla.suse.com/1075748", }, { category: "external", summary: "SUSE Bug 1080039 for CVE-2017-5753", url: "https://bugzilla.suse.com/1080039", }, { category: "external", summary: "SUSE Bug 1087084 for CVE-2017-5753", url: "https://bugzilla.suse.com/1087084", }, { category: "external", summary: "SUSE Bug 1087939 for CVE-2017-5753", url: "https://bugzilla.suse.com/1087939", }, { category: "external", summary: "SUSE Bug 1089055 for CVE-2017-5753", url: "https://bugzilla.suse.com/1089055", }, { category: "external", summary: "SUSE Bug 1136865 for CVE-2017-5753", url: "https://bugzilla.suse.com/1136865", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2017-5753", url: "https://bugzilla.suse.com/1178658", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2017-5753", url: "https://bugzilla.suse.com/1201877", }, { category: "external", summary: "SUSE Bug 1209547 for CVE-2017-5753", url: "https://bugzilla.suse.com/1209547", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-5753", }, { cve: "CVE-2017-5754", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-5754", }, ], notes: [ { category: "general", text: "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-5754", url: "https://www.suse.com/security/cve/CVE-2017-5754", }, { category: "external", summary: "SUSE Bug 1068032 for CVE-2017-5754", url: "https://bugzilla.suse.com/1068032", }, { category: "external", summary: "SUSE Bug 1074562 for CVE-2017-5754", url: "https://bugzilla.suse.com/1074562", }, { category: "external", summary: "SUSE Bug 1074578 for CVE-2017-5754", url: "https://bugzilla.suse.com/1074578", }, { category: "external", summary: "SUSE Bug 1074701 for CVE-2017-5754", url: "https://bugzilla.suse.com/1074701", }, { category: "external", summary: "SUSE Bug 1075006 for CVE-2017-5754", url: "https://bugzilla.suse.com/1075006", }, { category: "external", summary: "SUSE Bug 1075008 for CVE-2017-5754", url: "https://bugzilla.suse.com/1075008", }, { category: "external", summary: "SUSE Bug 1087939 for CVE-2017-5754", url: "https://bugzilla.suse.com/1087939", }, { category: "external", summary: "SUSE Bug 1089055 for CVE-2017-5754", url: "https://bugzilla.suse.com/1089055", }, { category: "external", summary: "SUSE Bug 1115045 for CVE-2017-5754", url: "https://bugzilla.suse.com/1115045", }, { category: "external", summary: "SUSE Bug 1136865 for CVE-2017-5754", url: "https://bugzilla.suse.com/1136865", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2017-5754", url: "https://bugzilla.suse.com/1178658", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2017-5754", url: "https://bugzilla.suse.com/1201877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-5754", }, { cve: "CVE-2017-7541", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7541", }, ], notes: [ { category: "general", text: "The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7541", url: "https://www.suse.com/security/cve/CVE-2017-7541", }, { category: "external", summary: "SUSE Bug 1049645 for CVE-2017-7541", url: "https://bugzilla.suse.com/1049645", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-7541", }, { cve: "CVE-2017-7542", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7542", }, ], notes: [ { category: "general", text: "The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7542", url: "https://www.suse.com/security/cve/CVE-2017-7542", }, { category: "external", summary: "SUSE Bug 1049882 for CVE-2017-7542", url: "https://bugzilla.suse.com/1049882", }, { category: "external", summary: "SUSE Bug 1061936 for CVE-2017-7542", url: "https://bugzilla.suse.com/1061936", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-7542", }, { cve: "CVE-2017-8824", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8824", }, ], notes: [ { category: "general", text: "The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8824", url: "https://www.suse.com/security/cve/CVE-2017-8824", }, { category: "external", summary: "SUSE Bug 1070771 for CVE-2017-8824", url: "https://bugzilla.suse.com/1070771", }, { category: "external", summary: "SUSE Bug 1076734 for CVE-2017-8824", url: "https://bugzilla.suse.com/1076734", }, { category: "external", summary: "SUSE Bug 1092904 for CVE-2017-8824", url: "https://bugzilla.suse.com/1092904", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2017-8824", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-8824", }, { cve: "CVE-2017-8831", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8831", }, ], notes: [ { category: "general", text: "The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a \"double fetch\" vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8831", url: "https://www.suse.com/security/cve/CVE-2017-8831", }, { category: "external", summary: "SUSE Bug 1037994 for CVE-2017-8831", url: "https://bugzilla.suse.com/1037994", }, { category: "external", summary: "SUSE Bug 1061936 for CVE-2017-8831", url: "https://bugzilla.suse.com/1061936", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2017-8831", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2017-8831", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-8831", }, { cve: "CVE-2018-1000004", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000004", }, ], notes: [ { category: "general", text: "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000004", url: "https://www.suse.com/security/cve/CVE-2018-1000004", }, { category: "external", summary: "SUSE Bug 1076017 for CVE-2018-1000004", url: "https://bugzilla.suse.com/1076017", }, { category: "external", summary: "SUSE Bug 1091815 for CVE-2018-1000004", url: "https://bugzilla.suse.com/1091815", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-1000004", }, { cve: "CVE-2018-10322", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10322", }, ], notes: [ { category: "general", text: "The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10322", url: "https://www.suse.com/security/cve/CVE-2018-10322", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10322", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1090749 for CVE-2018-10322", url: "https://bugzilla.suse.com/1090749", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-10322", }, { cve: "CVE-2018-10323", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10323", }, ], notes: [ { category: "general", text: "The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10323", url: "https://www.suse.com/security/cve/CVE-2018-10323", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10323", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1090717 for CVE-2018-10323", url: "https://bugzilla.suse.com/1090717", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-10323", }, { cve: "CVE-2018-1068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1068", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1068", url: "https://www.suse.com/security/cve/CVE-2018-1068", }, { category: "external", summary: "SUSE Bug 1085107 for CVE-2018-1068", url: "https://bugzilla.suse.com/1085107", }, { category: "external", summary: "SUSE Bug 1085114 for CVE-2018-1068", url: "https://bugzilla.suse.com/1085114", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1068", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1123903 for CVE-2018-1068", url: "https://bugzilla.suse.com/1123903", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-1068", }, { cve: "CVE-2018-1118", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1118", }, ], notes: [ { category: "general", text: "Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1118", url: "https://www.suse.com/security/cve/CVE-2018-1118", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1118", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092472 for CVE-2018-1118", url: "https://bugzilla.suse.com/1092472", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-1118", }, { cve: "CVE-2018-12232", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-12232", }, ], notes: [ { category: "general", text: "In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat's execution, leading to a NULL pointer dereference and system crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-12232", url: "https://www.suse.com/security/cve/CVE-2018-12232", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-12232", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1097593 for CVE-2018-12232", url: "https://bugzilla.suse.com/1097593", }, { category: "external", summary: "SUSE Bug 1125907 for CVE-2018-12232", url: "https://bugzilla.suse.com/1125907", }, { category: "external", summary: "SUSE Bug 1127757 for CVE-2018-12232", url: "https://bugzilla.suse.com/1127757", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-12232", }, { cve: "CVE-2018-12714", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-12714", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial of service (slab out-of-bounds write) or possibly have unspecified other impact via crafted perf_event_open and mmap system calls.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-12714", url: "https://www.suse.com/security/cve/CVE-2018-12714", }, { category: "external", summary: "SUSE Bug 1098933 for CVE-2018-12714", url: "https://bugzilla.suse.com/1098933", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-12714", }, { cve: "CVE-2018-13053", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-13053", }, ], notes: [ { category: "general", text: "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-13053", url: "https://www.suse.com/security/cve/CVE-2018-13053", }, { category: "external", summary: "SUSE Bug 1099924 for CVE-2018-13053", url: "https://bugzilla.suse.com/1099924", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2018-13053", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-13053", }, { cve: "CVE-2018-18710", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18710", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18710", url: "https://www.suse.com/security/cve/CVE-2018-18710", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-18710", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-18710", }, { cve: "CVE-2018-19824", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19824", }, ], notes: [ { category: "general", text: "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19824", url: "https://www.suse.com/security/cve/CVE-2018-19824", }, { category: "external", summary: "SUSE Bug 1118152 for CVE-2018-19824", url: "https://bugzilla.suse.com/1118152", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-19824", }, { cve: "CVE-2018-5332", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-5332", }, ], notes: [ { category: "general", text: "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-5332", url: "https://www.suse.com/security/cve/CVE-2018-5332", }, { category: "external", summary: "SUSE Bug 1075621 for CVE-2018-5332", url: "https://bugzilla.suse.com/1075621", }, { category: "external", summary: "SUSE Bug 1091815 for CVE-2018-5332", url: "https://bugzilla.suse.com/1091815", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2018-5332", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.6, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-5332", }, { cve: "CVE-2018-5333", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-5333", }, ], notes: [ { category: "general", text: "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-5333", url: "https://www.suse.com/security/cve/CVE-2018-5333", }, { category: "external", summary: "SUSE Bug 1075617 for CVE-2018-5333", url: "https://bugzilla.suse.com/1075617", }, { category: "external", summary: "SUSE Bug 1091815 for CVE-2018-5333", url: "https://bugzilla.suse.com/1091815", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.9, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-5333", }, { cve: "CVE-2018-8043", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8043", }, ], notes: [ { category: "general", text: "The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8043", url: "https://www.suse.com/security/cve/CVE-2018-8043", }, { category: "external", summary: "SUSE Bug 1084829 for CVE-2018-8043", url: "https://bugzilla.suse.com/1084829", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 0, baseSeverity: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-8043", }, { cve: "CVE-2018-8087", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8087", }, ], notes: [ { category: "general", text: "Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8087", url: "https://www.suse.com/security/cve/CVE-2018-8087", }, { category: "external", summary: "SUSE Bug 1085053 for CVE-2018-8087", url: "https://bugzilla.suse.com/1085053", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-8087", }, { cve: "CVE-2018-8822", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8822", }, ], notes: [ { category: "general", text: "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8822", url: "https://www.suse.com/security/cve/CVE-2018-8822", }, { category: "external", summary: "SUSE Bug 1086162 for CVE-2018-8822", url: "https://bugzilla.suse.com/1086162", }, { category: "external", summary: "SUSE Bug 1090404 for CVE-2018-8822", url: "https://bugzilla.suse.com/1090404", }, { category: "external", summary: "SUSE Bug 1091815 for CVE-2018-8822", url: "https://bugzilla.suse.com/1091815", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-8822", }, { cve: "CVE-2019-10207", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-10207", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-10207", url: "https://www.suse.com/security/cve/CVE-2019-10207", }, { category: "external", summary: "SUSE Bug 1123959 for CVE-2019-10207", url: "https://bugzilla.suse.com/1123959", }, { category: "external", summary: "SUSE Bug 1142857 for CVE-2019-10207", url: "https://bugzilla.suse.com/1142857", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-10207", }, { cve: "CVE-2019-11477", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-11477", }, ], notes: [ { category: "general", text: "Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-11477", url: "https://www.suse.com/security/cve/CVE-2019-11477", }, { category: "external", summary: "SUSE Bug 1132686 for CVE-2019-11477", url: "https://bugzilla.suse.com/1132686", }, { category: "external", summary: "SUSE Bug 1137586 for CVE-2019-11477", url: "https://bugzilla.suse.com/1137586", }, { category: "external", summary: "SUSE Bug 1142129 for CVE-2019-11477", url: "https://bugzilla.suse.com/1142129", }, { category: "external", summary: "SUSE Bug 1153242 for CVE-2019-11477", url: "https://bugzilla.suse.com/1153242", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.2, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-11477", }, { cve: "CVE-2019-11478", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-11478", }, ], notes: [ { category: "general", text: "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-11478", url: "https://www.suse.com/security/cve/CVE-2019-11478", }, { category: "external", summary: "SUSE Bug 1132686 for CVE-2019-11478", url: "https://bugzilla.suse.com/1132686", }, { category: "external", summary: "SUSE Bug 1137586 for CVE-2019-11478", url: "https://bugzilla.suse.com/1137586", }, { category: "external", summary: "SUSE Bug 1142129 for CVE-2019-11478", url: "https://bugzilla.suse.com/1142129", }, { category: "external", summary: "SUSE Bug 1143542 for CVE-2019-11478", url: "https://bugzilla.suse.com/1143542", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-11478", }, { cve: "CVE-2019-11479", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-11479", }, ], notes: [ { category: "general", text: "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-11479", url: "https://www.suse.com/security/cve/CVE-2019-11479", }, { category: "external", summary: "SUSE Bug 1132686 for CVE-2019-11479", url: "https://bugzilla.suse.com/1132686", }, { category: "external", summary: "SUSE Bug 1137586 for CVE-2019-11479", url: "https://bugzilla.suse.com/1137586", }, { category: "external", summary: "SUSE Bug 1142129 for CVE-2019-11479", url: "https://bugzilla.suse.com/1142129", }, { category: "external", summary: "SUSE Bug 1143542 for CVE-2019-11479", url: "https://bugzilla.suse.com/1143542", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-11479", }, { cve: "CVE-2019-14615", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14615", }, ], notes: [ { category: "general", text: "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14615", url: "https://www.suse.com/security/cve/CVE-2019-14615", }, { category: "external", summary: "SUSE Bug 1160195 for CVE-2019-14615", url: "https://bugzilla.suse.com/1160195", }, { category: "external", summary: "SUSE Bug 1165881 for CVE-2019-14615", url: "https://bugzilla.suse.com/1165881", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-14615", }, { cve: "CVE-2019-14814", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14814", }, ], notes: [ { category: "general", text: "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14814", url: "https://www.suse.com/security/cve/CVE-2019-14814", }, { category: "external", summary: "SUSE Bug 1146512 for CVE-2019-14814", url: "https://bugzilla.suse.com/1146512", }, { category: "external", summary: "SUSE Bug 1173664 for CVE-2019-14814", url: "https://bugzilla.suse.com/1173664", }, { category: "external", summary: "SUSE Bug 1173665 for CVE-2019-14814", url: "https://bugzilla.suse.com/1173665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-14814", }, { cve: "CVE-2019-14896", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14896", }, ], notes: [ { category: "general", text: "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14896", url: "https://www.suse.com/security/cve/CVE-2019-14896", }, { category: "external", summary: "SUSE Bug 1157157 for CVE-2019-14896", url: "https://bugzilla.suse.com/1157157", }, { category: "external", summary: "SUSE Bug 1160468 for CVE-2019-14896", url: "https://bugzilla.suse.com/1160468", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-14896", }, { cve: "CVE-2019-15030", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15030", }, ], notes: [ { category: "general", text: "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15030", url: "https://www.suse.com/security/cve/CVE-2019-15030", }, { category: "external", summary: "SUSE Bug 1149713 for CVE-2019-15030", url: "https://bugzilla.suse.com/1149713", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-15030", }, { cve: "CVE-2019-15031", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15031", }, ], notes: [ { category: "general", text: "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15031", url: "https://www.suse.com/security/cve/CVE-2019-15031", }, { category: "external", summary: "SUSE Bug 1149713 for CVE-2019-15031", url: "https://bugzilla.suse.com/1149713", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-15031", }, { cve: "CVE-2019-15098", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15098", }, ], notes: [ { category: "general", text: "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15098", url: "https://www.suse.com/security/cve/CVE-2019-15098", }, { category: "external", summary: "SUSE Bug 1146378 for CVE-2019-15098", url: "https://bugzilla.suse.com/1146378", }, { category: "external", summary: "SUSE Bug 1146543 for CVE-2019-15098", url: "https://bugzilla.suse.com/1146543", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-15098", }, { cve: "CVE-2019-15099", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15099", }, ], notes: [ { category: "general", text: "drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15099", url: "https://www.suse.com/security/cve/CVE-2019-15099", }, { category: "external", summary: "SUSE Bug 1146368 for CVE-2019-15099", url: "https://bugzilla.suse.com/1146368", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-15099", }, { cve: "CVE-2019-15290", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15290", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15290", url: "https://www.suse.com/security/cve/CVE-2019-15290", }, { category: "external", summary: "SUSE Bug 1146378 for CVE-2019-15290", url: "https://bugzilla.suse.com/1146378", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15290", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1146543 for CVE-2019-15290", url: "https://bugzilla.suse.com/1146543", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15290", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15290", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-15290", }, { cve: "CVE-2019-15504", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15504", }, ], notes: [ { category: "general", text: "drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15504", url: "https://www.suse.com/security/cve/CVE-2019-15504", }, { category: "external", summary: "SUSE Bug 1147116 for CVE-2019-15504", url: "https://bugzilla.suse.com/1147116", }, { category: "external", summary: "SUSE Bug 1185852 for CVE-2019-15504", url: "https://bugzilla.suse.com/1185852", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-15504", }, { cve: "CVE-2019-15902", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15902", }, ], notes: [ { category: "general", text: "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15902", url: "https://www.suse.com/security/cve/CVE-2019-15902", }, { category: "external", summary: "SUSE Bug 1149376 for CVE-2019-15902", url: "https://bugzilla.suse.com/1149376", }, { category: "external", summary: "SUSE Bug 1155131 for CVE-2019-15902", url: "https://bugzilla.suse.com/1155131", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-15902", }, { cve: "CVE-2019-16231", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16231", }, ], notes: [ { category: "general", text: "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16231", url: "https://www.suse.com/security/cve/CVE-2019-16231", }, { category: "external", summary: "SUSE Bug 1150466 for CVE-2019-16231", url: "https://bugzilla.suse.com/1150466", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-16231", }, { cve: "CVE-2019-16232", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16232", }, ], notes: [ { category: "general", text: "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16232", url: "https://www.suse.com/security/cve/CVE-2019-16232", }, { category: "external", summary: "SUSE Bug 1150465 for CVE-2019-16232", url: "https://bugzilla.suse.com/1150465", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-16232", }, { cve: "CVE-2019-16234", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16234", }, ], notes: [ { category: "general", text: "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16234", url: "https://www.suse.com/security/cve/CVE-2019-16234", }, { category: "external", summary: "SUSE Bug 1150452 for CVE-2019-16234", url: "https://bugzilla.suse.com/1150452", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-16234", }, { cve: "CVE-2019-17133", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-17133", }, ], notes: [ { category: "general", text: "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-17133", url: "https://www.suse.com/security/cve/CVE-2019-17133", }, { category: "external", summary: "SUSE Bug 1153158 for CVE-2019-17133", url: "https://bugzilla.suse.com/1153158", }, { category: "external", summary: "SUSE Bug 1153161 for CVE-2019-17133", url: "https://bugzilla.suse.com/1153161", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-17133", }, { cve: "CVE-2019-17666", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-17666", }, ], notes: [ { category: "general", text: "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-17666", url: "https://www.suse.com/security/cve/CVE-2019-17666", }, { category: "external", summary: "SUSE Bug 1154372 for CVE-2019-17666", url: "https://bugzilla.suse.com/1154372", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-17666", }, { cve: "CVE-2019-18808", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18808", }, ], notes: [ { category: "general", text: "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18808", url: "https://www.suse.com/security/cve/CVE-2019-18808", }, { category: "external", summary: "SUSE Bug 1156259 for CVE-2019-18808", url: "https://bugzilla.suse.com/1156259", }, { category: "external", summary: "SUSE Bug 1189884 for CVE-2019-18808", url: "https://bugzilla.suse.com/1189884", }, { category: "external", summary: "SUSE Bug 1190534 for CVE-2019-18808", url: "https://bugzilla.suse.com/1190534", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-18808", }, { cve: "CVE-2019-18812", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18812", }, ], notes: [ { category: "general", text: "A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18812", url: "https://www.suse.com/security/cve/CVE-2019-18812", }, { category: "external", summary: "SUSE Bug 1156277 for CVE-2019-18812", url: "https://bugzilla.suse.com/1156277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-18812", }, { cve: "CVE-2019-18813", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18813", }, ], notes: [ { category: "general", text: "A memory leak in the dwc3_pci_probe() function in drivers/usb/dwc3/dwc3-pci.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering platform_device_add_properties() failures, aka CID-9bbfceea12a8.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18813", url: "https://www.suse.com/security/cve/CVE-2019-18813", }, { category: "external", summary: "SUSE Bug 1156278 for CVE-2019-18813", url: "https://bugzilla.suse.com/1156278", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-18813", }, { cve: "CVE-2019-19252", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19252", }, ], notes: [ { category: "general", text: "vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19252", url: "https://www.suse.com/security/cve/CVE-2019-19252", }, { category: "external", summary: "SUSE Bug 1157813 for CVE-2019-19252", url: "https://bugzilla.suse.com/1157813", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-19252", }, { cve: "CVE-2019-19332", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19332", }, ], notes: [ { category: "general", text: "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel's KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could use this flaw to crash the system, resulting in a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19332", url: "https://www.suse.com/security/cve/CVE-2019-19332", }, { category: "external", summary: "SUSE Bug 1158827 for CVE-2019-19332", url: "https://bugzilla.suse.com/1158827", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-19332", }, { cve: "CVE-2019-19338", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19338", }, ], notes: [ { category: "general", text: "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19338", url: "https://www.suse.com/security/cve/CVE-2019-19338", }, { category: "external", summary: "SUSE Bug 1158954 for CVE-2019-19338", url: "https://bugzilla.suse.com/1158954", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-19338", }, { cve: "CVE-2019-3016", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3016", }, ], notes: [ { category: "general", text: "In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3016", url: "https://www.suse.com/security/cve/CVE-2019-3016", }, { category: "external", summary: "SUSE Bug 1159281 for CVE-2019-3016", url: "https://bugzilla.suse.com/1159281", }, { category: "external", summary: "SUSE Bug 1161154 for CVE-2019-3016", url: "https://bugzilla.suse.com/1161154", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-3016", }, { cve: "CVE-2019-3846", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3846", }, ], notes: [ { category: "general", text: "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3846", url: "https://www.suse.com/security/cve/CVE-2019-3846", }, { category: "external", summary: "SUSE Bug 1136424 for CVE-2019-3846", url: "https://bugzilla.suse.com/1136424", }, { category: "external", summary: "SUSE Bug 1136446 for CVE-2019-3846", url: "https://bugzilla.suse.com/1136446", }, { category: "external", summary: "SUSE Bug 1156330 for CVE-2019-3846", url: "https://bugzilla.suse.com/1156330", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-3846", }, { cve: "CVE-2019-3882", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3882", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3882", url: "https://www.suse.com/security/cve/CVE-2019-3882", }, { category: "external", summary: "SUSE Bug 1131416 for CVE-2019-3882", url: "https://bugzilla.suse.com/1131416", }, { category: "external", summary: "SUSE Bug 1131427 for CVE-2019-3882", url: "https://bugzilla.suse.com/1131427", }, { category: "external", summary: "SUSE Bug 1133319 for CVE-2019-3882", url: "https://bugzilla.suse.com/1133319", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-3882", }, { cve: "CVE-2019-3887", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3887", }, ], notes: [ { category: "general", text: "A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0's APIC register values via L2 guest, when 'virtualize x2APIC mode' is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3887", url: "https://www.suse.com/security/cve/CVE-2019-3887", }, { category: "external", summary: "SUSE Bug 1131800 for CVE-2019-3887", url: "https://bugzilla.suse.com/1131800", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-3887", }, { cve: "CVE-2019-6974", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-6974", }, ], notes: [ { category: "general", text: "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-6974", url: "https://www.suse.com/security/cve/CVE-2019-6974", }, { category: "external", summary: "SUSE Bug 1124728 for CVE-2019-6974", url: "https://bugzilla.suse.com/1124728", }, { category: "external", summary: "SUSE Bug 1124729 for CVE-2019-6974", url: "https://bugzilla.suse.com/1124729", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-6974", }, { cve: "CVE-2019-7221", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-7221", }, ], notes: [ { category: "general", text: "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-7221", url: "https://www.suse.com/security/cve/CVE-2019-7221", }, { category: "external", summary: "SUSE Bug 1124732 for CVE-2019-7221", url: "https://bugzilla.suse.com/1124732", }, { category: "external", summary: "SUSE Bug 1124734 for CVE-2019-7221", url: "https://bugzilla.suse.com/1124734", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-7221", }, { cve: "CVE-2019-7222", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-7222", }, ], notes: [ { category: "general", text: "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-7222", url: "https://www.suse.com/security/cve/CVE-2019-7222", }, { category: "external", summary: "SUSE Bug 1124735 for CVE-2019-7222", url: "https://bugzilla.suse.com/1124735", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.8, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-7222", }, { cve: "CVE-2019-8564", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-8564", }, ], notes: [ { category: "general", text: "A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-8564", url: "https://www.suse.com/security/cve/CVE-2019-8564", }, { category: "external", summary: "SUSE Bug 1132673 for CVE-2019-8564", url: "https://bugzilla.suse.com/1132673", }, { category: "external", summary: "SUSE Bug 1132828 for CVE-2019-8564", url: "https://bugzilla.suse.com/1132828", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-8564", }, { cve: "CVE-2019-8912", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-8912", }, ], notes: [ { category: "general", text: "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-8912", url: "https://www.suse.com/security/cve/CVE-2019-8912", }, { category: "external", summary: "SUSE Bug 1125907 for CVE-2019-8912", url: "https://bugzilla.suse.com/1125907", }, { category: "external", summary: "SUSE Bug 1126284 for CVE-2019-8912", url: "https://bugzilla.suse.com/1126284", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-8912", }, { cve: "CVE-2019-9500", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-9500", }, ], notes: [ { category: "general", text: "The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-9500", url: "https://www.suse.com/security/cve/CVE-2019-9500", }, { category: "external", summary: "SUSE Bug 1132681 for CVE-2019-9500", url: "https://bugzilla.suse.com/1132681", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-9500", }, { cve: "CVE-2020-10135", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-10135", }, ], notes: [ { category: "general", text: "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-10135", url: "https://www.suse.com/security/cve/CVE-2020-10135", }, { category: "external", summary: "SUSE Bug 1171988 for CVE-2020-10135", url: "https://bugzilla.suse.com/1171988", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-10135", }, { cve: "CVE-2020-10766", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-10766", }, ], notes: [ { category: "general", text: "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-10766", url: "https://www.suse.com/security/cve/CVE-2020-10766", }, { category: "external", summary: "SUSE Bug 1159281 for CVE-2020-10766", url: "https://bugzilla.suse.com/1159281", }, { category: "external", summary: "SUSE Bug 1172781 for CVE-2020-10766", url: "https://bugzilla.suse.com/1172781", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-10766", }, { cve: "CVE-2020-10767", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-10767", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-10767", url: "https://www.suse.com/security/cve/CVE-2020-10767", }, { category: "external", summary: "SUSE Bug 1159281 for CVE-2020-10767", url: "https://bugzilla.suse.com/1159281", }, { category: "external", summary: "SUSE Bug 1172782 for CVE-2020-10767", url: "https://bugzilla.suse.com/1172782", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-10767", }, { cve: "CVE-2020-10768", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-10768", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-10768", url: "https://www.suse.com/security/cve/CVE-2020-10768", }, { category: "external", summary: "SUSE Bug 1159281 for CVE-2020-10768", url: "https://bugzilla.suse.com/1159281", }, { category: "external", summary: "SUSE Bug 1172783 for CVE-2020-10768", url: "https://bugzilla.suse.com/1172783", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-10768", }, { cve: "CVE-2020-12351", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12351", }, ], notes: [ { category: "general", text: "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12351", url: "https://www.suse.com/security/cve/CVE-2020-12351", }, { category: "external", summary: "SUSE Bug 1177724 for CVE-2020-12351", url: "https://bugzilla.suse.com/1177724", }, { category: "external", summary: "SUSE Bug 1177729 for CVE-2020-12351", url: "https://bugzilla.suse.com/1177729", }, { category: "external", summary: "SUSE Bug 1178397 for CVE-2020-12351", url: "https://bugzilla.suse.com/1178397", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-12351", }, { cve: "CVE-2020-12352", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12352", }, ], notes: [ { category: "general", text: "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12352", url: "https://www.suse.com/security/cve/CVE-2020-12352", }, { category: "external", summary: "SUSE Bug 1177725 for CVE-2020-12352", url: "https://bugzilla.suse.com/1177725", }, { category: "external", summary: "SUSE Bug 1178398 for CVE-2020-12352", url: "https://bugzilla.suse.com/1178398", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-12352", }, { cve: "CVE-2020-14331", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14331", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14331", url: "https://www.suse.com/security/cve/CVE-2020-14331", }, { category: "external", summary: "SUSE Bug 1174205 for CVE-2020-14331", url: "https://bugzilla.suse.com/1174205", }, { category: "external", summary: "SUSE Bug 1174247 for CVE-2020-14331", url: "https://bugzilla.suse.com/1174247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14331", }, { cve: "CVE-2020-14386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14386", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14386", url: "https://www.suse.com/security/cve/CVE-2020-14386", }, { category: "external", summary: "SUSE Bug 1176069 for CVE-2020-14386", url: "https://bugzilla.suse.com/1176069", }, { category: "external", summary: "SUSE Bug 1176072 for CVE-2020-14386", url: "https://bugzilla.suse.com/1176072", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14386", }, { cve: "CVE-2020-24586", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-24586", }, ], notes: [ { category: "general", text: "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-24586", url: "https://www.suse.com/security/cve/CVE-2020-24586", }, { category: "external", summary: "SUSE Bug 1185859 for CVE-2020-24586", url: "https://bugzilla.suse.com/1185859", }, { category: "external", summary: "SUSE Bug 1192868 for CVE-2020-24586", url: "https://bugzilla.suse.com/1192868", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-24586", }, { cve: "CVE-2020-24587", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-24587", }, ], notes: [ { category: "general", text: "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-24587", url: "https://www.suse.com/security/cve/CVE-2020-24587", }, { category: "external", summary: "SUSE Bug 1185859 for CVE-2020-24587", url: "https://bugzilla.suse.com/1185859", }, { category: "external", summary: "SUSE Bug 1185862 for CVE-2020-24587", url: "https://bugzilla.suse.com/1185862", }, { category: "external", summary: "SUSE Bug 1192868 for CVE-2020-24587", url: "https://bugzilla.suse.com/1192868", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-24587", }, { cve: "CVE-2020-24588", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-24588", }, ], notes: [ { category: "general", text: "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-24588", url: "https://www.suse.com/security/cve/CVE-2020-24588", }, { category: "external", summary: "SUSE Bug 1185861 for CVE-2020-24588", url: "https://bugzilla.suse.com/1185861", }, { category: "external", summary: "SUSE Bug 1192868 for CVE-2020-24588", url: "https://bugzilla.suse.com/1192868", }, { category: "external", summary: "SUSE Bug 1199701 for CVE-2020-24588", url: "https://bugzilla.suse.com/1199701", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-24588", }, { cve: "CVE-2020-25639", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25639", }, ], notes: [ { category: "general", text: "A NULL pointer dereference flaw was found in the Linux kernel's GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25639", url: "https://www.suse.com/security/cve/CVE-2020-25639", }, { category: "external", summary: "SUSE Bug 1176846 for CVE-2020-25639", url: "https://bugzilla.suse.com/1176846", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-25639", }, { cve: "CVE-2020-25656", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25656", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25656", url: "https://www.suse.com/security/cve/CVE-2020-25656", }, { category: "external", summary: "SUSE Bug 1177766 for CVE-2020-25656", url: "https://bugzilla.suse.com/1177766", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-25656", }, { cve: "CVE-2020-25668", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25668", }, ], notes: [ { category: "general", text: "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25668", url: "https://www.suse.com/security/cve/CVE-2020-25668", }, { category: "external", summary: "SUSE Bug 1178123 for CVE-2020-25668", url: "https://bugzilla.suse.com/1178123", }, { category: "external", summary: "SUSE Bug 1178622 for CVE-2020-25668", url: "https://bugzilla.suse.com/1178622", }, { category: "external", summary: "SUSE Bug 1196914 for CVE-2020-25668", url: "https://bugzilla.suse.com/1196914", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-25668", }, { cve: "CVE-2020-26141", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-26141", }, ], notes: [ { category: "general", text: "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-26141", url: "https://www.suse.com/security/cve/CVE-2020-26141", }, { category: "external", summary: "SUSE Bug 1185987 for CVE-2020-26141", url: "https://bugzilla.suse.com/1185987", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-26141", }, { cve: "CVE-2020-2732", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2732", }, ], notes: [ { category: "general", text: "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2732", url: "https://www.suse.com/security/cve/CVE-2020-2732", }, { category: "external", summary: "SUSE Bug 1163971 for CVE-2020-2732", url: "https://bugzilla.suse.com/1163971", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2020-2732", }, { cve: "CVE-2020-29660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29660", }, ], notes: [ { category: "general", text: "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29660", url: "https://www.suse.com/security/cve/CVE-2020-29660", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-29660", }, { cve: "CVE-2020-29661", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29661", }, ], notes: [ { category: "general", text: "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29661", url: "https://www.suse.com/security/cve/CVE-2020-29661", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179877", }, { category: "external", summary: "SUSE Bug 1214268 for CVE-2020-29661", url: "https://bugzilla.suse.com/1214268", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2020-29661", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-29661", }, { cve: "CVE-2020-8648", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-8648", }, ], notes: [ { category: "general", text: "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-8648", url: "https://www.suse.com/security/cve/CVE-2020-8648", }, { category: "external", summary: "SUSE Bug 1162928 for CVE-2020-8648", url: "https://bugzilla.suse.com/1162928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-8648", }, { cve: "CVE-2020-8694", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-8694", }, ], notes: [ { category: "general", text: "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-8694", url: "https://www.suse.com/security/cve/CVE-2020-8694", }, { category: "external", summary: "SUSE Bug 1170415 for CVE-2020-8694", url: "https://bugzilla.suse.com/1170415", }, { category: "external", summary: "SUSE Bug 1170446 for CVE-2020-8694", url: "https://bugzilla.suse.com/1170446", }, { category: "external", summary: "SUSE Bug 1178591 for CVE-2020-8694", url: "https://bugzilla.suse.com/1178591", }, { category: "external", summary: "SUSE Bug 1178700 for CVE-2020-8694", url: "https://bugzilla.suse.com/1178700", }, { category: "external", summary: "SUSE Bug 1179661 for CVE-2020-8694", url: "https://bugzilla.suse.com/1179661", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-8694", }, { cve: "CVE-2021-23133", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-23133", }, ], notes: [ { category: "general", text: "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-23133", url: "https://www.suse.com/security/cve/CVE-2021-23133", }, { category: "external", summary: "SUSE Bug 1184675 for CVE-2021-23133", url: "https://bugzilla.suse.com/1184675", }, { category: "external", summary: "SUSE Bug 1185901 for CVE-2021-23133", url: "https://bugzilla.suse.com/1185901", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-23133", }, { cve: "CVE-2021-26708", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26708", }, ], notes: [ { category: "general", text: "A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26708", url: "https://www.suse.com/security/cve/CVE-2021-26708", }, { category: "external", summary: "SUSE Bug 1181806 for CVE-2021-26708", url: "https://bugzilla.suse.com/1181806", }, { category: "external", summary: "SUSE Bug 1183298 for CVE-2021-26708", url: "https://bugzilla.suse.com/1183298", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-26708", }, { cve: "CVE-2021-28971", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28971", }, ], notes: [ { category: "general", text: "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28971", url: "https://www.suse.com/security/cve/CVE-2021-28971", }, { category: "external", summary: "SUSE Bug 1184196 for CVE-2021-28971", url: "https://bugzilla.suse.com/1184196", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-28971", }, { cve: "CVE-2021-32606", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-32606", }, ], notes: [ { category: "general", text: "In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-32606", url: "https://www.suse.com/security/cve/CVE-2021-32606", }, { category: "external", summary: "SUSE Bug 1185953 for CVE-2021-32606", url: "https://bugzilla.suse.com/1185953", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-32606", }, { cve: "CVE-2021-33909", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-33909", }, ], notes: [ { category: "general", text: "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-33909", url: "https://www.suse.com/security/cve/CVE-2021-33909", }, { category: "external", summary: "SUSE Bug 1188062 for CVE-2021-33909", url: "https://bugzilla.suse.com/1188062", }, { category: "external", summary: "SUSE Bug 1188063 for CVE-2021-33909", url: "https://bugzilla.suse.com/1188063", }, { category: "external", summary: "SUSE Bug 1188257 for CVE-2021-33909", url: "https://bugzilla.suse.com/1188257", }, { category: "external", summary: "SUSE Bug 1189302 for CVE-2021-33909", url: "https://bugzilla.suse.com/1189302", }, { category: "external", summary: "SUSE Bug 1190859 for CVE-2021-33909", url: "https://bugzilla.suse.com/1190859", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-33909", }, { cve: "CVE-2021-3483", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3483", }, ], notes: [ { category: "general", text: "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3483", url: "https://www.suse.com/security/cve/CVE-2021-3483", }, { category: "external", summary: "SUSE Bug 1184393 for CVE-2021-3483", url: "https://bugzilla.suse.com/1184393", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-3483", }, { cve: "CVE-2021-3489", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3489", }, ], notes: [ { category: "general", text: "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3489", url: "https://www.suse.com/security/cve/CVE-2021-3489", }, { category: "external", summary: "SUSE Bug 1185640 for CVE-2021-3489", url: "https://bugzilla.suse.com/1185640", }, { category: "external", summary: "SUSE Bug 1185856 for CVE-2021-3489", url: "https://bugzilla.suse.com/1185856", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-3489", }, { cve: "CVE-2021-3490", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3490", }, ], notes: [ { category: "general", text: "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3490", url: "https://www.suse.com/security/cve/CVE-2021-3490", }, { category: "external", summary: "SUSE Bug 1185641 for CVE-2021-3490", url: "https://bugzilla.suse.com/1185641", }, { category: "external", summary: "SUSE Bug 1185796 for CVE-2021-3490", url: "https://bugzilla.suse.com/1185796", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-3490", }, { cve: "CVE-2021-3491", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3491", }, ], notes: [ { category: "general", text: "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/<PID>/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3491", url: "https://www.suse.com/security/cve/CVE-2021-3491", }, { category: "external", summary: "SUSE Bug 1185642 for CVE-2021-3491", url: "https://bugzilla.suse.com/1185642", }, { category: "external", summary: "SUSE Bug 1187090 for CVE-2021-3491", url: "https://bugzilla.suse.com/1187090", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-3491", }, { cve: "CVE-2021-3640", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3640", }, ], notes: [ { category: "general", text: "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3640", url: "https://www.suse.com/security/cve/CVE-2021-3640", }, { category: "external", summary: "SUSE Bug 1188172 for CVE-2021-3640", url: "https://bugzilla.suse.com/1188172", }, { category: "external", summary: "SUSE Bug 1188613 for CVE-2021-3640", url: "https://bugzilla.suse.com/1188613", }, { category: "external", summary: "SUSE Bug 1191530 for CVE-2021-3640", url: "https://bugzilla.suse.com/1191530", }, { category: "external", summary: "SUSE Bug 1196810 for CVE-2021-3640", url: "https://bugzilla.suse.com/1196810", }, { category: "external", summary: "SUSE Bug 1196914 for CVE-2021-3640", url: "https://bugzilla.suse.com/1196914", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-3640", }, { cve: "CVE-2021-3653", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3653", }, ], notes: [ { category: "general", text: "A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3653", url: "https://www.suse.com/security/cve/CVE-2021-3653", }, { category: "external", summary: "SUSE Bug 1189399 for CVE-2021-3653", url: "https://bugzilla.suse.com/1189399", }, { category: "external", summary: "SUSE Bug 1189420 for CVE-2021-3653", url: "https://bugzilla.suse.com/1189420", }, { category: "external", summary: "SUSE Bug 1196914 for CVE-2021-3653", url: "https://bugzilla.suse.com/1196914", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-3653", }, { cve: "CVE-2021-3656", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3656", }, ], notes: [ { category: "general", text: "A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3656", url: "https://www.suse.com/security/cve/CVE-2021-3656", }, { category: "external", summary: "SUSE Bug 1189400 for CVE-2021-3656", url: "https://bugzilla.suse.com/1189400", }, { category: "external", summary: "SUSE Bug 1189418 for CVE-2021-3656", url: "https://bugzilla.suse.com/1189418", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-3656", }, { cve: "CVE-2021-3744", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3744", }, ], notes: [ { category: "general", text: "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3744", url: "https://www.suse.com/security/cve/CVE-2021-3744", }, { category: "external", summary: "SUSE Bug 1189884 for CVE-2021-3744", url: "https://bugzilla.suse.com/1189884", }, { category: "external", summary: "SUSE Bug 1190534 for CVE-2021-3744", url: "https://bugzilla.suse.com/1190534", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-3744", }, { cve: "CVE-2021-3753", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3753", }, ], notes: [ { category: "general", text: "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3753", url: "https://www.suse.com/security/cve/CVE-2021-3753", }, { category: "external", summary: "SUSE Bug 1190025 for CVE-2021-3753", url: "https://bugzilla.suse.com/1190025", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.9, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2021-3753", }, { cve: "CVE-2021-37576", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-37576", }, ], notes: [ { category: "general", text: "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-37576", url: "https://www.suse.com/security/cve/CVE-2021-37576", }, { category: "external", summary: "SUSE Bug 1188838 for CVE-2021-37576", url: "https://bugzilla.suse.com/1188838", }, { category: "external", summary: "SUSE Bug 1188842 for CVE-2021-37576", url: "https://bugzilla.suse.com/1188842", }, { category: "external", summary: "SUSE Bug 1190276 for CVE-2021-37576", url: "https://bugzilla.suse.com/1190276", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-37576", }, { cve: "CVE-2021-3759", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3759", }, ], notes: [ { category: "general", text: "A memory overflow vulnerability was found in the Linux kernel's ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3759", url: "https://www.suse.com/security/cve/CVE-2021-3759", }, { category: "external", summary: "SUSE Bug 1190115 for CVE-2021-3759", url: "https://bugzilla.suse.com/1190115", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-3759", }, { cve: "CVE-2021-38166", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-38166", }, ], notes: [ { category: "general", text: "In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-38166", url: "https://www.suse.com/security/cve/CVE-2021-38166", }, { category: "external", summary: "SUSE Bug 1189233 for CVE-2021-38166", url: "https://bugzilla.suse.com/1189233", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-38166", }, ], }
gsd-2018-18710
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.
Aliases
Aliases
{ GSD: { alias: "CVE-2018-18710", description: "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", id: "GSD-2018-18710", references: [ "https://www.suse.com/security/cve/CVE-2018-18710.html", "https://ubuntu.com/security/CVE-2018-18710", "https://alas.aws.amazon.com/cve/html/CVE-2018-18710.html", "https://linux.oracle.com/cve/CVE-2018-18710.html", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2018-18710", ], details: "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", id: "GSD-2018-18710", modified: "2023-12-13T01:22:35.933892Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-18710", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "USN-3848-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3848-2/", }, { name: "USN-3847-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3847-1/", }, { name: "USN-3847-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3847-2/", }, { name: "USN-3849-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3849-1/", }, { name: "106041", refsource: "BID", url: "http://www.securityfocus.com/bid/106041", }, { name: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276", refsource: "MISC", url: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276", }, { name: "USN-3849-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3849-2/", }, { name: "USN-3848-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3848-1/", }, { name: "USN-3847-3", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3847-3/", }, { name: "USN-3846-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3846-1/", }, { name: "[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html", }, { name: "https://github.com/torvalds/linux/commit/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276", refsource: "MISC", url: "https://github.com/torvalds/linux/commit/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276", }, { name: "[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html", }, { name: "[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "4.19", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-18710", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-200", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/torvalds/linux/commit/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276", refsource: "MISC", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/torvalds/linux/commit/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276", }, { name: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276", refsource: "MISC", tags: [ "Patch", "Third Party Advisory", ], url: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276", }, { name: "106041", refsource: "BID", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106041", }, { name: "USN-3849-2", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3849-2/", }, { name: "USN-3848-2", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3848-2/", }, { name: "USN-3848-1", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3848-1/", }, { name: "USN-3847-3", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3847-3/", }, { name: "USN-3847-2", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3847-2/", }, { name: "USN-3847-1", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3847-1/", }, { name: "USN-3846-1", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3846-1/", }, { name: "USN-3849-1", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3849-1/", }, { name: "[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html", }, { name: "[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html", }, { name: "[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "LOW", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 3.6, }, }, lastModifiedDate: "2019-04-03T12:39Z", publishedDate: "2018-10-29T12:29Z", }, }, }
ghsa-hj3r-hcwm-9448
Vulnerability from github
Published
2022-05-14 01:13
Modified
2022-05-14 01:13
Severity ?
Details
An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.
{ affected: [], aliases: [ "CVE-2018-18710", ], database_specific: { cwe_ids: [ "CWE-200", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2018-10-29T12:29:00Z", severity: "MODERATE", }, details: "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", id: "GHSA-hj3r-hcwm-9448", modified: "2022-05-14T01:13:38Z", published: "2022-05-14T01:13:38Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-18710", }, { type: "WEB", url: "https://github.com/torvalds/linux/commit/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276", }, { type: "WEB", url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html", }, { type: "WEB", url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html", }, { type: "WEB", url: "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html", }, { type: "WEB", url: "https://usn.ubuntu.com/3846-1", }, { type: "WEB", url: "https://usn.ubuntu.com/3847-1", }, { type: "WEB", url: "https://usn.ubuntu.com/3847-2", }, { type: "WEB", url: "https://usn.ubuntu.com/3847-3", }, { type: "WEB", url: "https://usn.ubuntu.com/3848-1", }, { type: "WEB", url: "https://usn.ubuntu.com/3848-2", }, { type: "WEB", url: "https://usn.ubuntu.com/3849-1", }, { type: "WEB", url: "https://usn.ubuntu.com/3849-2", }, { type: "WEB", url: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276", }, { type: "WEB", url: "http://www.securityfocus.com/bid/106041", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", type: "CVSS_V3", }, ], }
fkie_cve-2018-18710
Vulnerability from fkie_nvd
Published
2018-10-29 12:29
Modified
2024-11-21 03:56
Severity ?
Summary
An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 18.10 | |
debian | debian_linux | 8.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "AF8125D1-648B-4421-B0FC-089A20CBB248", versionEndIncluding: "4.19", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", matchCriteriaId: "8D305F7A-D159-4716-AB26-5E38BB5CD991", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", matchCriteriaId: "07C312A0-CD2C-4B9C-B064-6409B25C278F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", }, { lang: "es", value: "Se ha descubierto un problema en el kernel de Linux hasta la versión 4.19. Una fuga de información en cdrom_ioctl_select_disc en drivers/cdrom/cdrom.c podría ser empleada por atacantes locales para leer memoria del kernel debido a que una conversión de un long no firmado a int interfiere con la comprobación de límites. Esto es similar a CVE-2018-10940 y CVE-2018-16658.", }, ], id: "CVE-2018-18710", lastModified: "2024-11-21T03:56:25.320", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-10-29T12:29:05.807", references: [ { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106041", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/torvalds/linux/commit/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3846-1/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3847-1/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3847-2/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3847-3/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3848-1/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3848-2/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3849-1/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3849-2/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106041", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/torvalds/linux/commit/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3846-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3847-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3847-2/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3847-3/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3848-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3848-2/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3849-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3849-2/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-200", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.